[go: up one dir, main page]

US20230353551A1 - Access control system - Google Patents

Access control system Download PDF

Info

Publication number
US20230353551A1
US20230353551A1 US18/218,352 US202318218352A US2023353551A1 US 20230353551 A1 US20230353551 A1 US 20230353551A1 US 202318218352 A US202318218352 A US 202318218352A US 2023353551 A1 US2023353551 A1 US 2023353551A1
Authority
US
United States
Prior art keywords
microprocessor
access
user credential
access control
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US18/218,352
Inventor
Courtney Ryan GIBSON
Robert Douglas
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Medixsafe Inc
Original Assignee
BioConnect Inc
Bioconnect Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BioConnect Inc, Bioconnect Inc filed Critical BioConnect Inc
Priority to US18/218,352 priority Critical patent/US20230353551A1/en
Assigned to BIOCONNECT INC. reassignment BIOCONNECT INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DOUGLAS, ROBERT, GIBSON, Courtney Ryan
Publication of US20230353551A1 publication Critical patent/US20230353551A1/en
Assigned to MEDIXSAFE INC. reassignment MEDIXSAFE INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BIOCONNECT INC.
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/47Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules

Definitions

  • Embodiments of the present disclosure relate to the field of access control, and more specifically, embodiments relate to devices, systems and methods for access control using reduced computing capability computing devices (such as microprocessors and/or microcontrollers).
  • reduced computing capability computing devices such as microprocessors and/or microcontrollers.
  • Access control management systems are often configured for usage on a legacy communications protocol.
  • Legacy access control systems in some instances, rely on the physical security provided by a direct, hard-wired connection (e.g., Wiegand, OSDP, etc.) between the components of the access control system and the associated access control readers (e.g., RFID card readers, mobile credential readers, PIN pads, etc.).
  • the Wiegand interface is a wiring protocol that utilizes electrical effects that occur during a short timeframe for signalling (e.g., when a magnetic strip card is presented to a reader device, a series of bits are signalled through modifications of electric current during switches of magnetic state, or via radio frequency identification (RFID) protocols that are used to generate corresponding electrical signals, for example, through induction induced on electronic components of an access badge).
  • RFID radio frequency identification
  • Legacy ACMs are prevalent in facility securement. These legacy ACMs typically operate with a set of corresponding access control tokens which are issued to individuals who are authorized to access controlled resources (e.g., enter doors, open data server cabinets, generate authenticated login sessions at computer terminals).
  • the access control tokens can include access fobs (e.g., storing a code accessible by near field communications or inductive coupling).
  • the legacy existing approach presents significant limitations, both in the requirement to run dedicated wiring throughout the building, and that the maximum typical operating distance is less than 100 meters.
  • the upgrade or retrofit is not trivial as technical problems persist in respect of technical signalling challenges. Furthermore, from a practical perspective, the upgrade or retrofit is potentially costly as a large number of devices may be needed, and there may be a desire to utilize lower cost and complexity by incorporating low power/low clock speed microprocessors.
  • legacy wireless solutions While there may be legacy wireless solutions, they typically rely on relatively short-range radio protocols, such as IEEE 802.15, which can eliminate some of the overhead of running existing wiring, but further-reduces the maximum distance between access control hubs and the associated access control readers to a maximum typical operating distance of 10-20 meters. Such a short distance is not desirable and limits the potential application of the system.
  • a retrofit improvement would allow, for example, technology-based restrictions, such as the requirement to have dedicated wiring and a short maximum operating distance, to be overcome.
  • the retrofit improvement includes intercepting signals bound for or from legacy systems, and adding improved infrastructure to utilize, combine, expand, and/or add functionality to the legacy systems.
  • the legacy systems may be coupled with modernized digital backend systems that can provide additional layers of security, including beacon based security, mobile credentials (e.g., those stored on smartphones), integration with directory services, dynamic security shifts (e.g., raised security requirements responsive to a detected breach of a similar technology at an unrelated site detected through news alerts), dynamic failovers (e.g., communications outage, power outage, natural disaster), among others.
  • beacon based security mobile credentials (e.g., those stored on smartphones), integration with directory services, dynamic security shifts (e.g., raised security requirements responsive to a detected breach of a similar technology at an unrelated site detected through news alerts), dynamic failovers (e.g., communications outage, power outage, natural disaster), among others.
  • mobile credentials e.g., those stored on smartphones
  • integration with directory services e.g., dynamic security shifts (e.g., raised security requirements responsive to a detected breach of a similar technology at an unrelated site detected through news alerts), dynamic failovers (e
  • the retrofit can further allow the overcoming of prior technological barriers, such as wire-based distance limitations (e.g., adding a remote backcountry toolshed accessible to repair technicians to a security infrastructure to be monitored alongside city-based premises), among others.
  • the retrofit also adds the potential for non-security based integration extensibility, such as adding well-ness checks (e.g., temperature monitoring), well-ness declarations, travel-based declarations, and verification of same prior to provisioning access, for example, by cross-referencing location-based data or personnel records.
  • Retrofits include safety-based retrofits (e.g., prior to long-haul truck driver gaining access to a vehicle, alcohol testing via a breath test, or rest/sleep tracking determinations may be required to aid in improving transportation safety). Retrofits can extend functionality in respect of specific use cases, for example, where the identity can be extended to activities associated with secured elements, such as digital evidence lockers adapted for anti-tampering and improved monitoring for law enforcement.
  • a technical challenge that arises with using legacy communications protocols is that the speed at which the series of bits are signalled through modifications of electric current during the switches of magnetic states requires high timing accuracy by a coupled microprocessor. For example, the width and timing of pulses can be critical.
  • the technical signalling problem associated with legacy systems raises due to legacy access control tokens transmitting their payload asynchronously, for example, via a one-way RFID protocol.
  • This means that the transmitting RFID card, keyfob or similar device is unaware of the receiver's state, and, in particular, it is unaware of the receiver's immediate willingness or ability to receive the transmitted signal, and the receiver is unable to ask the transmitter to pause, repeat or change the speed of the transmission. If the receiver is not immediately able to receive every transmitted value, then one or more parts of the transmission will be lost and unrecoverable (e.g., unable to interpret or incorrectly interpreted). These errors in reception can cause the legacy access control system to either deny entry to an otherwise-authorized individual, could incorrectly raise monitoring alarms related to invalid access attempts.
  • the controllers For low power microcontrollers (e.g., those designed to be operated using portable batteries or in regions where power is not steadily available), the controllers have slower clock speeds (e.g., 160 MHz or 16 MHz). As the period of a clock cycle is the inverse of the clock speed, the clock cycles of the low power microcontrollers can be computationally long.
  • Processing simultaneous access control events can consume all available clock cycle budget, leaving no additional capacity for the microcontroller to manage the other device requirements, such as managing network communication, eventing monitoring, encryption, etc.
  • Another technical problem that could arise in relation to digital integration with improved external cloud-based access control systems includes a need to avoid transmitting plaintext or practically reversible card identifiers or facility identifiers to the external access control systems.
  • a potential attack vector is reduced as a malicious attacker cannot use information obtained through intercepting the network connection or through vulnerabilities at the external access control systems.
  • This technical problem can be addressed by the low power microcontrollers described in various embodiments.
  • a microcontroller circuit and corresponding circuit topologies, computing systems, methods of operation, and computer program products affixed in the form of non-transitory computer readable memories storing machine-interpretable instruction sets for execution on one or more computer processors are provided.
  • a proposed microcontroller circuit in accordance with a first aspect, includes a first microprocessor configured for interfacing with a digital access control backend, and a second microprocessor configured for dedicated communications with an access control manager device backend.
  • This proposed approach encompasses four main signaling requirements: (i) it has to receive the incoming signal from a legacy access control token (for example, an RFID card, keyfob or similar device); (ii) it has to transform the signaled token value into a secure form, suitable for remote digital processing (e.g., via secure, one-way hashing, such as HMAC-SHA256) and then securely transmit that event information to the remote digital server (for example, via TLS-secured MQTT protocol); (iii) it has to receive back a secure authentication confirmation from the remote digital server, which must be decrypted, decoded and processed (for example, via TLS-secured MQTT protocol); and, (iv) it must then recreate and transmit the original legacy access control token onwards to the legacy access control system, using the precise format and signal timing that the legacy access control system is configured to accept.
  • a legacy access control token for example, an RFID card, keyfob or similar device
  • HMAC-SHA256 secure, one-way hashing
  • legacy access control devices are not only adapted for retrofit to enable interoperability with improved digital systems, but the access control is extended in respect of adding interconnections to remote devices that could otherwise be impractical to connect.
  • access control devices can be extended to vehicles, remote facilities (e.g., an equipment shed that would otherwise be impractical to connect via physical wiring), among others.
  • the first microprocessor e.g., an ESP32 system on a chip microprocessor
  • the second microprocessor e.g., an ATMega168 microcontroller having general purpose input/output pins
  • the first microprocessor e.g., an ESP32 system on a chip microprocessor
  • the second microprocessor e.g., an ATMega168 microcontroller having general purpose input/output pins
  • the first microprocessor is adapted for conducting digital communications protocols and credential transformation operations.
  • the second microprocessor emulates signals based on command instructions received from the first microprocessor, the emulated signals used for communicating with a legacy ACM system.
  • the first microprocessor in some embodiments, has greater computing capability than the second microprocessor. Because the second microprocessor is dedicated to communications across the signalling protocol, its ability to provide correctly timed signals is improved.
  • the proposed design of an embodiment provides one microcontroller that is always ready to process, decode and validate the incoming signals, and generate the timing-dependent outgoing signals, while the other microprocessor (e.g., secondary microprocessor) is able to handle the remaining work of communication with the remote digital server.
  • the other microprocessor e.g., secondary microprocessor
  • a microcontroller system that incorporating the first microprocessor and the second microprocessor provides an interface between access events (e.g., physical or virtual access events) that operate on legacy systems and coupling them to digital backend that provides enhanced user profile/security features.
  • the legacy transaction protocol is translated for two-way communication—in one direction for transmitting access tokens provided by users (e.g., door badging at a panel using a keyfob) and in the other direction for provisioning access (e.g., granting access by releasing a magnetic lock or initiating a secured computer session on a secured graphical user interface).
  • the system may reside on-premises such that data transferred (e.g., facility numbers, card numbers) can be locally stored.
  • the first microprocessor and the second microprocessor are electronically coupled to one another through a messaging bus, and in some embodiments, an additional interrupt line that operates to enable the second microprocessor to communicate event triggers to the first microprocessor (e.g., instead of inefficiently polling).
  • An example physical access could be usage for controlling/denying entry into a building when a key card is presented at a reader.
  • the reader can receive a Wiegand signal from the key card (e.g., as a magnetic strip is run across, a series of electrical pulses are generated, or a corresponding RFID signal) and this signal is sent to the secondary microprocessor to decode and then the decoded message is sent to the master microprocessor, which either authenticates locally (in some embodiments) or authenticates by sending a transformed decoded message to an external authentication mechanism (e.g., an external server).
  • an external authentication mechanism e.g., an external server
  • the reader can also receive a Bluetooth signal from a mobile device.
  • Another example access could be usage for controlling/denying connection to a car ignition system.
  • Another example could be usage for reading a keyfob identifier (or some other token) from the car's system. This can be useful in situations where the car already has a legacy keyfob system that has some vulnerabilities or limited utility.
  • the car can be extended to be covered in respect of the retrofit system, and car keyfobs can be intercepted and additional verification and authentication is required in respect of security (e.g., adding additional security elements due to prevalence of a suspected relay attack) or non-security-based improvements, such as safety (e.g., alcohol testing) or rest-based requirements (e.g., coupling to a fatigue monitor, such as a smartwatch).
  • security e.g., adding additional security elements due to prevalence of a suspected relay attack
  • non-security-based improvements such as safety (e.g., alcohol testing) or rest-based requirements (e.g., coupling to a fatigue monitor, such as a smartwatch).
  • Another example includes control of car garage remotes.
  • the master microprocessor Upon receipt of a successful authentication message from the external authentication mechanism, the master microprocessor sends an instruction signal to the secondary microprocessor to generate a corresponding signal for controlling the access control provisioning (e.g., in a legacy communication protocol).
  • the access control provisioning e.g., in a legacy communication protocol.
  • An example virtual access could include controlling/denying secured login into a restaurant cashier terminal when a server presents a key card at a reader coupled to the cashier terminal.
  • Secure hashing (such as, but not limited to, SHA-AES256) can be used for communications securement. Secure hashing and a secret key can be integrated together, rendering it practically irreversible and anonymized.
  • the first microprocessor can store local secret keys on-premises, which can be used in conjunction with public keys to be signed and for generation of certificates (e.g., x509 certificates). Accordingly, a hard segregation can be established between the microcontroller system and the external systems.
  • certificates e.g., x509 certificates
  • the system described herein can be used, an in embodiment, as a system for providing interoperable access control between a digital backend authentication system and an access control system, the system comprising an interception device (e.g., having the microcontroller systems) configured to intercept physical access requests received from a sensor and to forward the physical access requests to the digital backend authentication system for validation.
  • An interception device e.g., having the microcontroller systems
  • a receiver interface can be configured to receive authorization signal from the digital backend authentication system to allow a physical access event to proceed; and a protocol transformation engine can be configured to transform the authorization signal and to transmit a transformed authorization signal to the access control system.
  • an additional interrupt connection link is established between the first microprocessor and the second microprocessor to allow for interrupt type signals to be transmitted (e.g., to reduce a need to utilize polling, which could be computationally costly and inefficient to operate).
  • the first microprocessor is coupled to an external authentication mechanism (e.g., external authentication server) and configured to transform received credentials from the second microprocessor.
  • Local credentials e.g., facility number, card ID number
  • secure hashing e.g., through the use of secure hashing
  • the transformation of the local credentials allows the ability to avoidance of sending up plaintext/reversible local credentials to the external authentication mechanism.
  • the external authentication mechanism is able to authenticate the associated user profiles without having the ability to observe directly the schema or underlying local access credentials.
  • the secure hashing key is shared between the various on-premises devices—via a secure key-sharing algorithm (e.g., public key cryptography, or a variant of Needham-Shroeder)—so that all of the devices can produce an identical transformation (used for later matching the user's physical identity to their digital identity).
  • the secure key sharing is constructed such that an external validation system (e.g., the cloud service) is unable to discover or recover the on-premises key.
  • the first microprocessor is configured to maintain a rolling secret stored in a local data structure whose corresponding key is periodically provided to the external authentication server.
  • the rolling secret can include a private symmetric key that is used to generate a message to the external authentication server with the key (e.g., generated based on a magic #, a sequence #, a facility #, a card #), etc.
  • the external authentication server receives the transformed credentials (e.g., a securely-hashed value, generated from the underlying credentials), which it can process and something it is not capable of processing or generating (a token generated from the rolling secret).
  • the first microprocessor and the second microprocessor are configured for offline usage when disconnected from the external authentication server.
  • the online usage capabilities can be limited.
  • the first microprocessor may be coupled to a data storage storing a cyclical buffer of previous successful access attempts and even if disconnected from the external authentication server, those authenticated profiles, upon the first microcontroller receiving a corresponding correct input from the ACM to the second microcontroller, can generate control signals provisioning or denying access to a controlled resource.
  • memory regions of data storage coupled to or residing on the first microprocessor can be used for avoiding the need for explicit time stamping through a re-use of the memory region marking mechanism.
  • This mechanism is particularly useful where the clocks on the first or the second microprocessor (or both) cannot be relied upon to provide accurate timestamps (this issue arises in respect of low cost and low-power implementations, such as timestamp slippage or a poorly synchronized local clock), or if the microprocessors simply don't have clocks.
  • a compiler instruction can be used to mark memory as non-initialized—on initial power on, the system sets a flag to 0, once the system obtains network connectivity, it periodically updates a RAM based standard variable with the time. When the system restarts, the microprocessor takes that time and loads the time into the system clock. Accordingly, the microcontroller is able to maintain a view of current time across reboots or software failures without a battery, clock, etc.
  • FIG. 1 is a block schematic diagram of an example system for access control, according to some embodiments.
  • FIG. 2 is an example method diagram showing an example method for access control, according to some embodiments.
  • FIG. 3 is an example computing device, according to some embodiments.
  • FIG. 4 is a diagram showing an example retrofit system, according to some embodiments.
  • FIG. 5 is an example block schematic showing a more complex system, according to some embodiments.
  • FIG. 6 is a block schematic showing a system being extended to provide protection in respect of a vehicle, according to some embodiments.
  • FIG. 7 is a electrical pulse diagram of signals associated with a set of example doors, according to some embodiments.
  • FIG. 8 is a second electrical pulse diagram of signals associated with a set of example doors, according to some embodiments.
  • a technical challenge that arises with using legacy communications protocols is that the speed at which the series of bits are signalled through modifications of electric current during the switches of magnetic states (or using RFID) requires high timing accuracy by a coupled microprocessor.
  • the width and timing of pulses can be critical. This level of timing accuracy can be important, for example, where the legacy communications protocols utilize coded signals such as specifically modulated radio waves (e.g., keyfobs operating at 315 MHz or approximately 433 MHz), modulated, for example, using amplitude-shift keying.
  • coded signals such as specifically modulated radio waves (e.g., keyfobs operating at 315 MHz or approximately 433 MHz), modulated, for example, using amplitude-shift keying.
  • RFID devices access cards, car keyfobs, etc.
  • these devices simply blindly transmit signals without any flow control that would permit the receiver to delay or control the timing of the input from the RFID devices.
  • legacy access control tokens transmit their payload asynchronously, typically via a one-way RFID protocol.
  • the receiver will either be unable to interpret the transmitted credential, or it may incorrectly interpret the transmitted credential value as another, shorter value (e.g., if 6 bits are lost from a 32-bit credential transmission, it may be incorrectly received as a different, but valid-looking 26-bit credential transmission). These errors in reception can cause the legacy access control system to either deny entry to an otherwise-authorized individual, could incorrectly raise monitoring alarms related to invalid access attempts.
  • the controllers For low power microcontrollers (e.g., those designed to be operated using portable batteries or in regions where power is not steadily available), the controllers have slower clock speeds (e.g., 160 MHz or 16 MHz). Without being able to delay or control the timing of the input from the RFID devices, it is challenging to utilize slower clock speed microprocessors as a signal mistiming can render a device inoperable or cause poor operation as signals are not processed properly.
  • a proposed microcontroller-based solution is described herein that allows existing physical access control systems and the associated access control readers (or access controllers, such as vehicular locks, garage door openers, cabinet latches) to be readily retrofitted to support mobile and/or geographically-dispersed environments with limited or without any additional changes to or reconfiguration of the existing system components.
  • the approaches described herein are adapted to address technical problems associated with using electronic devices having limited computational functionality, such as limited power and/or clock speed.
  • this proposed microcontroller-based solution allows existing physical access control systems to be readily retrofitted to allow monitoring and protection through an enterprise's existing network monitoring systems, potentially without requiring any changes (e.g., significant changes) to the existing access control readers or systems. This allows an enhanced range of potential retrofits, including, for example, vehicle keyfobs, storage cabinet keypads, among others.
  • a retrofit solution described herein provides a practical, low cost approach for addressing weaknesses with existing implementations (e.g., adding layers of security to overcome a vulnerability to a keyfob “relay attack”) using low clock speed microprocessors.
  • extending functionality is also possible where, for example, one wishes to add mobile credential processing capabilities, well-ness checks, connections to actively managed directory service or digital security infrastructure, etc., to existing infrastructure without needing to re-wire existing readers.
  • one remotely-situated microcontroller-based device connected to an access control reader, may be configured to readily retrofit existing physical access control systems to permit mobile applications, without requiring any changes to the existing access control readers or systems; it can facilitate this by securely relaying an encrypted, time-limited representation of the end-user's authenticated access credential to a centrally-located microcontroller-based device that is connected to the enterprise's existing physical access control system, using standard network communication layer(s) and protocols.
  • the microcontroller-based device can be electronically coupled to the access control reader, for example, as an additional component connected through wiring or wireless connectively that operates as an agent or intercepts signals to a backend access provisioning controller that ultimately grants or denies access by controlling the operation of a door or a latch.
  • many remotely-situated microcontroller-based devices connected to access control readers, are configured to relay end-users' authenticated access credentials to one centrally-located microcontroller-based device connected to a single traditional access control panel, thereby eliminating or reducing the traditional scaling costs associated with adding a large number of access points, without requiring any changes to the existing access control readers or systems.
  • a microcontroller-based device connected to an access control reader, may be configured to relay end-users' authenticated access credentials to multiple microcontroller-based devices that are each connected to individual access control systems. This can permit access events at a plethora of locations to be mirrored and consolidated into one central location, without requiring any changes to the existing access control readers or systems, which provides for greatly-simplified, standardized monitoring of access events, reducing the cost and complexity of alternative approaches for retrofits.
  • the proposed design of various embodiments uses one microcontroller that is always ready to process, decode and validate the incoming signals, and generate the timing-dependent outgoing signals, while the other microprocessor is able to handle the remaining work of communication with the remote digital server.
  • FIG. 1 is an example block schematic diagram of an example system for access control, according to some embodiments.
  • system 100 is shown as an on-premises device that is coupled to legacy access control mechanisms on one end and coupled to an external verification system. Coupling to legacy access control mechanisms is challenging with low-power or low-clock speed microprocessors as there is a high level of accuracy required for accurate communications.
  • System 100 can also be placed on remote locations, in other embodiments, such as being coupled to vehicular locks, garage door openers, cabinets/lockers, among others.
  • the vehicular lock system may be expecting a coded series of pulses at a particular frequency from a keyfob to be received prior to unlocking a door or allowing ignition of an engine.
  • the clock cycles of the low power microcontrollers can be computationally long. While a high power processor can provide enough head room, the long clock cycles of the low power microcontrollers causes a technical problem in relation to achieving the high timing accuracy required by legacy communications protocols, especially where the low power microcontrollers are conducting other functions or the protocol requires narrow pulses (e.g., to provide voltage pulldowns to signal specific bits at approximately 50 us—a single missed pulldown could result in an error).
  • the legacy system may simply not respond or throw an error signal, resulting in an individual either obtaining access when access is not warranted or not obtaining access although authenticated successfully.
  • a low clock speed microprocessor is favourable as it is able to operate on portable energy sources (such as batteries) for extended periods of time (e.g., >5 days), which is a distinct advantage in locales where power is not readily or consistently available.
  • portable energy sources such as batteries
  • the facilities may simply not have power outlets near the access control devices and they must operate on portable energy sources.
  • Low clock speed microprocessors also have a benefit of being compact in volume and weight, which allows for an increased ease of deployment.
  • a signal requiring 50+/ ⁇ 5 us in accuracy could be delayed in transmission due to instruction congestion/backlog.
  • a delay in 50 us leads to a completely different signal from being received, there may be a corresponding inaccuracy due to the delay at the receiver system.
  • a microcontroller circuit 100 and corresponding circuit topologies, computing systems, methods of operation, and computer program products affixed in the form of non-transitory computer readable memories storing machine-interpretable instruction sets for execution on one or more computer processors is provided.
  • the machine-interpretable instruction sets can be adapted as computer program products for execution on the one or more computer processors.
  • the circuit 100 is adapted to address four main signaling requirements: (i) it has to receive the incoming signal from a legacy access control token (for example, an RFID card, keyfob or similar device); (ii) it has to transform the signaled token value into a secure form, suitable for remote digital processing (e.g., via secure, one-way hashing, such as HMAC-SHA256) and then securely transmit that event information to the remote digital server (for example, via TLS-secured MQTT protocol); (iii) it has to receive back a secure authentication confirmation from the remote digital server, which must be decrypted, decoded and processed (for example, via TLS-secured MQTT protocol); and, (iv) it must then recreate and transmit the original legacy access control token onwards to the legacy access control system, using the precise format and signal timing that the legacy access control system is configured to accept.
  • a legacy access control token for example, an RFID card, keyfob or similar device
  • HMAC-SHA256 secure, one-way has
  • a proposed device e.g., a microcontroller circuit 100 , in accordance with a first aspect, includes a first microprocessor 102 configured for interfacing with a digital access control backend 104 , and a second microprocessor 106 configured for dedicated communications with an access control manager device backend.
  • the first microprocessor 102 e.g., an ESP32 system on a chip microprocessor
  • the second microprocessor 106 e.g., an ATMega168 microcontroller having general purpose input/output pins
  • the first microprocessor 102 is adapted for conducting digital communications protocols and credential transformation operations.
  • the second microprocessor 106 emulates signals based on command instructions received from the first microprocessor 102 , the emulated signals used for communicating with a legacy ACM system.
  • the first microprocessor 102 in some embodiments, has greater computing capability than the second microprocessor 106 .
  • both the first microprocessor 102 and the second microprocessor 106 can have the same or similar computing specifications. Because the second microprocessor 106 is dedicated to communications across the signalling protocol, its ability to provide correctly timed signals is improved.
  • a microcontroller system 100 incorporating the first microprocessor 102 and the second microprocessor 106 provides an interface between access events (e.g., physical or virtual access events) that operate on legacy systems and coupling them to digital backend that provides enhanced user profile/security features.
  • access events e.g., physical or virtual access events
  • the legacy transaction protocol is translated for two-way communication—in one direction for transmitting access tokens provided by users (e.g., door badging at a panel using a key fob) and in the other direction for provisioning access (e.g., granting access by releasing a magnetic lock or initiating a secured computer session on a secured graphical user interface).
  • the legacy transaction protocol can, in some embodiments, be based on analog signals that are shaped to reflect a digital signal being communicated. For example, the analog signals may be reproduced with digital bits signalled through corresponding voltage pulldowns which signal digital bits (e.g., 0 or 1).
  • the legacy transaction protocol may interact with specific protocols such that a reader will be able to read from the analog signal characteristics the digital signal.
  • the digital signal can, in some embodiments, be a representation of a characteristics of the badge access event device or the person associated with the access badge, such as age, sex, title, facility code, client code, among others.
  • the system may reside on-premises such that data transferred (e.g., facility numbers, card numbers) can be locally stored.
  • data transferred e.g., facility numbers, card numbers
  • the first microprocessor 102 and the second microprocessor 106 are electronically coupled to one another through a messaging bus 108 , and in some embodiments, an additional interrupt line 110 that operates to enable the second microprocessor 106 to communicate event triggers to the first microprocessor 102 (e.g., instead of inefficiently polling).
  • the message bus 108 can be, for example, based on a 120 architecture.
  • the interrupt line 110 can be a signal path that is designed for level triggering or edge triggering, and for example, can be a signal path having a voltage that is pulled down or up whenever an interrupt signal is being established.
  • the interrupt signal in this example, can indicate to the master first microprocessor 102 that an authentication attempt is underway at the device coupled to second microprocessor 106 , rather than having the first microprocessor 102 continually poll the second microprocessor 106 to query whether such signal is present.
  • An example physical access controlled by second microprocessor 106 could be used for controlling/denying entry into a building when a key card is presented at a reader.
  • an authentication challenge response signal can be transmitted.
  • the authentication challenge response signal can be as simple as a card ID #associated with the key card, or more complex signals such as rolling codes that are generated based on a shared secret between the key token and the reader (e.g., a rolling code approach).
  • the reader may be configured to receive a Wiegand signal from the key card (e.g., as a magnetic strip is run across or an RFID card is presented, a series of electrical pulses are generated) and this signal is sent to the secondary microprocessor (second microprocessor 106 ) to decode and then the decoded message is sent to the master microprocessor (first microprocessor 102 ), which either authenticates locally (in some embodiments) or authenticates by sending a transformed decoded message to an external authentication mechanism 112 (e.g., an external server).
  • a Wiegand signal from the key card (e.g., as a magnetic strip is run across or an RFID card is presented, a series of electrical pulses are generated) and this signal is sent to the secondary microprocessor (second microprocessor 106 ) to decode and then the decoded message is sent to the master microprocessor (first microprocessor 102 ), which either authenticates locally (in some embodiments) or authenticates by sending a transformed decoded message to an external authentication mechanism 11
  • the external authentication mechanism 112 can include a cloud-based server implementation which is coupled to a user profile matching engine.
  • the cloud-based server implementation can incorporate processing rules which are adapted to generating digital rules-based architecture for determining access provisioning decisions.
  • Complex decision making can be established despite the presence of legacy systems, and in accordance with various embodiments herein.
  • Complex decision making can include time-based rules, machine learning based determinations, combinations with step up authentication (e.g., usage of combinations with other modalities where there is a potential for false positives or inconclusive authentication).
  • a user who should otherwise be authenticated for access at 8 AM attempts access at 2 AM.
  • the system may detect a correct authentication and key token presented at the reader, but for this user profile, the external authentication mechanism 112 may control an additional authentication to occur to request a fingerprint to add to an overall holistic determination of authentication.
  • the master microprocessor Upon receipt of a successful authentication message from the external authentication mechanism 112 , the master microprocessor (first microprocessor 102 ) sends an instruction signal to the secondary microprocessor (second microprocessor 106 ) to generate a corresponding signal for controlling the access control provisioning (e.g., in a legacy communication protocol).
  • the underlying decoded message is not revealed to the external authentication mechanism 112 .
  • the information is securely hashed based on a key that is only stored on-premises and thus never transferred to the external authentication mechanism 112 .
  • An example virtual access could include controlling/denying secured login into a restaurant cashier terminal when a server presents a key card at a reader coupled to the cashier terminal.
  • the key card could provide an initial facility code and a card ID, and this information may be received by the second microprocessor 106 , decoded, and passed to first microprocessor 102 .
  • the first microprocessor 102 then securely hashes and transforms the data, and only the transformed data is sent to the external authentication mechanism 112 .
  • the first microprocessor 102 can store local secret keys on-premises, which can be used in conjunction with public keys to be signed and for generation of certificates (e.g., x509 certificates). Accordingly, a hard segregation can be established between the microcontroller system and the external systems.
  • certificates e.g., x509 certificates
  • an additional interrupt connection link is established between the first microprocessor 102 and the second microprocessor 106 to allow for interrupt type signals to be transmitted (e.g., to reduce a need to utilize polling, which could be computationally costly and inefficient to operate).
  • This interrupt connection link is a technical improvement that is adapted for communication for controlling the second microprocessor 106 .
  • Other bus protocols for example, I2C
  • I2C have a technical deficiency as the protocol is not adapted to allow a secondary device (e.g., a “slave”) device (such as a microcontroller receiving Wiegand signals) to initiate communication with the primary “master” device (e.g., the primary microcontroller).
  • the second microprocessor 106 would normally have no way of announcing that a new scan (e.g., card scan) has occurred.
  • the first microcontroller 102 would need to continuously poll the second microprocessor 106 to determine if anything has arrived.
  • This approach would introduce two technical problems: (i) it delays the real-time processing of the user's card scan; and, (ii) the polling requests from the “master” all add additional overhead to the second microcontroller 106 , which increases the likelihood of missing incoming signal bits (e.g., Wiegand bits), causing a miscommunication error.
  • the first microprocessor 102 is coupled to an external authentication mechanism 112 (e.g., external authentication server) and configured to transform received credentials from the second microprocessor 106 .
  • Local credentials e.g., facility number, card ID number
  • are transformed e.g., through the use of public key encryption or secure hashing prior to communication to the external authentication mechanism 112 .
  • the transformation of the local credentials allows the ability to avoidance of sending up plaintext/reversible local credentials to the external authentication mechanism 112 .
  • the external authentication mechanism 112 is able to authenticate the associated user profiles without having the ability to observe directly the schema or underlying local access credentials.
  • the first microprocessor 102 is configured to maintain a rolling secret stored in a local data structure whose corresponding key is periodically provided to the external authentication server.
  • a rolling secret maintained locally and periodically transmitted, the threat of malicious access event emulation at the external authentication mechanism 112 level can be reduced once the rolling secret has rolled over.
  • the rolling secret can include a private symmetric key that is used to generate a message to the external authentication server with the key (e.g., generated based on a magic #, a sequence #, a facility #, a card #), etc.
  • the external authentication server receives the transformed credentials (e.g., a cookie generated from the underlying credentials), which it can process and something it is not capable of processing or generating (a token generated from the rolling secret).
  • first microprocessor 102 and the second microprocessor 106 are configured for offline usage when disconnected from the external authentication server.
  • the online usage capabilities can be limited.
  • the first microprocessor 102 may be coupled to a data storage storing a cyclical buffer of previous successful access attempts and even if disconnected from the external authentication server, those authenticated profiles, upon the first microcontroller receiving a corresponding correct input from the ACM to the second microcontroller, can generate control signals provisioning or denying access to a controlled resource.
  • memory regions of data storage coupled to or residing on the first microprocessor 102 can be used for avoiding the need for explicit time stamping through a re-use of the memory region marking mechanism.
  • This mechanism is particularly useful where the clocks on the first or the second microprocessor 106 (or both) cannot be relied upon to provide accurate timestamps (this issue arises in respect of low cost and low-power implementations, such as timestamp slippage or a poorly synchronized local clock), or if the microprocessors simply don't have clocks.
  • Flash memory is typically the only storage medium available on these low-power devices (i.e., they don't have hard drives) and flash memory will burn out and become unusable after anywhere from 250 k to 1M write-cycles which makes it infeasible for maintaining constantly-changing logs.
  • the “typical” approach is to use a large amount of flash memory and use “wear-levelling” techniques to try to maximize the lifetime of the flash chips.
  • the approach described herein maintains the required data structures needed for secure operation—without the need for operations that ultimately degrade the on-device flash memory.
  • a compiler instruction can be used to mark memory as non-initialized—on initial power on, the system sets a flag to 0, once the system obtains network connectivity, it periodically updates a RAM based standard variable with the time. When the system restarts, the microprocessor takes that time and loads the time into the system clock. Accordingly, the microcontroller is able to maintain a view of current time without a battery, clock, etc.
  • a naive approach would be to put a clock and a battery into the device—but that requires periodic maintenance of the battery (or limits the service lifetime of the device).
  • FIG. 2 is an example method diagram showing an example method 200 for access control, according to some embodiments, showing example steps 202 - 210 , which are non-limiting and other, different, alternate steps are possible.
  • a token or signals from a token are presented at a legacy reader, and the secondary (e.g., slave) limited clock speed microprocessor receives the signals and decodes the signals.
  • the signals can include authentication short width electrical pulses from that are received at a physical token reader. These signals are intercepted at the point of presentation and processed by the secondary limited clock speed microprocessor.
  • this decoded message is then provided in the form of a decoded identifier data value to the primary limited clock speed microprocessor.
  • the primary limited clock speed microprocessor can interact with an external authentication server by first converting the decoded message into a hashed representation and submitting the hashed representation to the external authentication server. By generating the hashed representation, the actual identifier associated with the user's identifier token need not be transmitted openly to the external authentication server, removing a source of cybersecurity risk.
  • the external authentication server processes the hashed representation to make an access provisioning determination. In some embodiments, this can include extended functionality prior to making the determination, such as controlling a mobile device to conduct other assessments in respect of location of the mobile device, requiring the entering of a password, among others.
  • the external authentication server compares the user identifier against an access control list, such as an active directory and various logical conditions thereof. For example, the external authentication server may require that a waiver has been filed on record, or a wellness declaration and temperature score below a particular threshold having been saved on record.
  • the access provisioning signal 208 is received by the primary limited clock speed microprocessor, which at 210 , controls the secondary limited clock speed microprocessor to conduct an actuation to allow access to various protected resources.
  • the primary limited clock speed microprocessor instead of controlling the secondary limited clock speed microprocessor, the primary limited clock speed microprocessor itself conduct an actuation to allow access to various protected resources.
  • Providing access can include unlocking a door, unlocking electronic access to an electronic account, unlatching a cabinet door, open a garage door, unlocking a vehicle's ignition, etc.
  • FIG. 3 is an example computing device 300 , according to some embodiments.
  • the computing device 300 is an example microprocessor or microcontroller, and the device 300 can include a computer processor 302 , memory 304 (e.g., read only memory, random access memory), an input/output interface 306 (e.g., I/O pins), and an interface 308 for communication, for example, with a message bus.
  • the computer processor 302 can be configured to interpret machine-interpretable instructions stored on a non-transitory computer readable medium, and to execute a method for access control in accordance with methods described in embodiments herein.
  • FIG. 4 is a diagram showing an example retrofit system, according to some embodiments.
  • an existing card reader 402 is augmented by a backend control unit 408 that can, for example, be a system 100 that operates to intercept signals as described in various embodiments herein.
  • the system 100 includes at least two low clock speed microprocessors that operate with one another to coordinate messaging using legacy protocols where one of the low clock speed microprocessors is dedicated to signal emulation in respect of received signals and/or access control provisioning signals. Accordingly, a person may present his/her key card to the reader 402 .
  • a signal may be provided, for example, through electrical coupling of the key card to the reader 402 (e.g., a series of electrical pulses).
  • the signal may be intercepted by the system 100 and read by a secondary, dedicated low clock speed microprocessor for generating an identity data object from the information adduced (e.g., converting the series of electrical pulses into an identity value).
  • This data object is then provided to a primary low clock speed microprocessor that generates a representation of this data object (e.g., a one way hashed version of the identity value) for transmission across network 450 to a backend digital access control manager 104 that can be coupled to one or more external databases.
  • backend digital access control manager 104 can include digital access controls that utilize an active directory service for improved control and authentication of the user.
  • backend digital access control manager 104 can interoperate with a mobile device having a secure repository for credential storage 405 and require an increased mobile credential 406 to be asserted in certain situations when the key card is presented to the reader 402 . For example, this can be required at a first usage of the key card, or when a security level has been increased (e.g., a pattern of breaches have been noticed in the news).
  • the mobile credential 406 can include various tokens or data objects, such as data packets having biometric information, password information, etc.
  • mobile credential 406 is related to requirements relating to wellness checks or other physical characteristics, such as requiring a declaration in respect of recent travel, recent location information from the device (e.g., to indicate that no recent travel has occurred), temperature readings (e.g., from a coupled biometric device), among others.
  • the backend digital access control manager 104 can provide a corresponding authenticated data object to the primary low clock speed microprocessor, which can then decode and securely transmit an instruction command to the secondary low clock speed microprocessor.
  • the secondary low clock speed microprocessor can emulate an authenticated signal based on a series of emulated codes and pulses to interoperate with the legacy system to provide access to the secured resource (e.g., unlocking door latch or magnetic closure device).
  • the device of FIG. 4 instead of being a retrofit, can include an extension of a legacy system.
  • a card reader 402 can be installed at a remote site, such as an inventory shed, that can be difficult or impractical to connect via wiring.
  • the system 100 can emulate the signals to a wired panel coupled to the legacy system to enable interoperability.
  • FIG. 4 is a simplified example; in some embodiments, the card reader 402 is coupled to a plurality of access controllers (e.g., doors, lockers) in the legacy implementation.
  • the signalling challenge here is exacerbated as the card reader 402 can receive multiple signals from access attempts at the plurality of doors and signal timing becomes even more important.
  • an implementation with a single lock clock speed microprocessor may become overwhelmed by multiple tasks and may miss actuations (or even worse, misinterpret actuations and inadvertently allow access).
  • a reader 402 to many secured access element (i.e., 1:n) situation can occur, for example, where the secured resource is an evidence locker having many doors (e.g., evidence from crime scene A, B, C each having their own section).
  • Other situations are also possible, such as three readers 402 servicing fifteen secured resources.
  • FIG. 5 is an example block schematic showing a more complex system, according to some embodiments.
  • diagram 500 shows a facility having a legacy system device 502 , 509 that is extended with additional beaconing devices 504 , 510 , 512 .
  • These beacon devices 504 , 510 , 512 are utilized in conjunction, for example, with a security camera or motion sensor 505 and a mobile device to ensure that a coupled mobile device is in a physical vicinity of the legacy system device 502 , 509 in addition to simply providing a key card. This is useful where a stolen key card is being utilized. By requiring the mobile device is in a physical vicinity of the legacy system device, the stolen key card is more difficult to use without the rightful owner being present.
  • the legacy system devices 502 , 509 can be extended with a system 100 as described in various embodiments.
  • the legacy system devices 502 , 509 can both be serviced by a single backend reader 402 that is coupled to both and receives/processes signals from both, sending actuation signals directly to the corresponding access provisioning mechanism (e.g., mantrap revolving door, door latch).
  • actuation signals directly to the corresponding access provisioning mechanism
  • the primary microprocessor can interoperate with the beacon devices and/or a digital backend, and control the secondary microprocessor for interoperation with the legacy system device 502 , 509 (e.g., signal interception and emulation both at the credential interaction level and the access granting level, respectively).
  • a series of pulses can be intercepted, processed with an additional level of scrutiny, and upon successful authentication at the higher level of scrutiny, a successful validation can be emulated and utilized for granting access to the secured resource 514 (in an example, a server room).
  • the beacon signals when received by the mobile device can be converted into distance estimations (e.g., ⁇ 25 dB, ⁇ 26 dB) so that the person has an additional level of validation by having the mobile device relay rolling codes along with the distance estimations as part of the validation process.
  • distance estimations e.g., ⁇ 25 dB, ⁇ 26 dB
  • a variation can include utilizing the system to be extended to garage doors, remote gates, among others. Supporting remote locations require the devices to manage a secure, encrypted network communication (to maintain a link to the centralized access control system). This raises similar technical issues as noted in various sections herein: the overhead of managing those interactions can interfere with the hard real-time requirements involved with capturing the incoming signals from access control tokens.
  • this proposed solution would allow a large number of new access-controlled spaces to be added to an existing access control system, without requiring the corresponding costs that would be traditionally associated with expanding the central access control system.
  • a large number of access-controlled cabinets such as a set of evidence lockers 516 , could be connected to one or more microcontroller-based devices.
  • Each of the evidence lockers 516 can be coupled to a legacy reader, and an additional extension may include, for example, access control devices that could be connected to a traditional access control reader to receive user credentials, and a traditional PIN pad to allow the user to enter the locker number.
  • the microcontroller-based device would close an attached electrical relay, thereby unlocking the selected locker 516 .
  • This permits a plethora of spaces to be securely controlled by a central access control system, without requiring any changes to the existing access control readers or system, and without the costs of scaling the central access control system.
  • FIG. 6 is a block schematic showing a system being extended to provide protection in respect of a vehicle, according to some embodiments.
  • System 600 in this example is a premises-based security system that is extended to provide improved authentication and validation in respect of a vehicle.
  • a keyfob 680 can be presented to a legacy validation/lock device 606 .
  • the legacy validation/lock device 606 in a na ⁇ ve implementation, is vulnerable to a relay attack where the keyfob 680 's signal is instead of being proximate, is relayed by a pair of malicious users operating in tandem.
  • the digital system 600 can be utilized along with components of the device described in system 100 to provide an efficient and effective retrofit solution to intercept and emulate signals to provide additional layers of security or validation prior to unlocking a door or ignition.
  • additional layers of validation can include declarations or indications in respect of rest (e.g., for truck drivers, a data object representing their sleeping/movement patterns), or in respect of drug testing (e.g., intoxication).
  • a microcontroller-based device mounted inside the vehicle would be attached to a traditional access control reader for receiving end-user credentials, and a modem (e.g., cellular) for network connectivity back to the access control system.
  • a modem e.g., cellular
  • the microcontroller-based device can retain a local cache of the end-user credential inside a local cache, to permit subsequent re-authentication of the user, even if the vehicle is outside of cellular range (e.g., in an underground parking garage). This permits access to a remote, mobile vehicle to be securely controlled by a central access control system, without requiring any changes to the existing access control readers or system.
  • this proposed solution would allow an existing access control system to be extended to remote locations that cannot be served by traditional, centralized wired/wireless solutions.
  • a microcontroller-based device mounted at a remote location would be attached to a traditional access control reader for receiving end-user credentials, and a modem (e.g., cellular) for network connectivity back to the access control system.
  • a modem e.g., cellular
  • the microcontroller-based device would close an attached electrical relay, thereby unlocking the door (e.g., releasing a maglock, an electrically-controlled door strike, or an electrically-controlled mortise lockset).
  • This permits the remote location to be securely controlled by a central access control system, without requiring any changes to the existing access control readers or system.
  • the system 100 provides a low cost system that can be used for a wide retrofit, and accordingly, an existing access control system to be extended into automotive vehicles, to permit those systems to control the remote access to vehicle fleets, in order to ensure that drivers are authorized employees and/or have proper training (e.g., hazardous vehicle operators).
  • FIG. 7 is a electrical pulse diagram of signals associated with a set of example doors, according to some embodiments.
  • diagram 700 a set of four doors are shown, with pulses associated with Wiegand 0 and 1 actuations.
  • Legacy access control systems make use of door controllers that typically service many readers, which means that interface devices such as this must have the capability of receiving multiple, simultaneous signals, as shown in FIG. 7 .
  • FIG. 8 is a second electrical pulse diagram of signals associated with a set of example doors, according to some embodiments.
  • a microcontroller is shown to be tasked with various decoding tasks in a short 50 us window.
  • the pulses have very short durations of time in which they can be processed, and a missed duration or a mis-timed actuation could lead to a miscommunicated or uninterpretable signal.
  • Incoming pulses can be read by the secondary microprocessor for decoding a message provided by a keyfob and intercepted.
  • the secondary microprocessor can, upon a successful authentication, be controlled to emulate the access pulses to the legacy system, for example, controlling electronic circuits to generate a corresponding set of pulses as if the system was encountering the keyfob.
  • connection may include both direct coupling (in which two elements that are coupled to each other contact each other) and indirect coupling (in which at least one additional element is located between the two elements).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A device is described that includes a first microprocessor configured for interfacing with a digital access control backend, and a second microprocessor configured for dedicated communications with an access control manager device backend. The first microprocessor is a master device that controls the operation of the second microprocessor as a secondary device. The proposed device is configured for operation of the first microprocessor and the second microprocessor at low clock speeds and to maintain a hash segregation between locally received data sets and data sets transmitted to an external authentication system.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. patent application Ser. No. 17/026,144, filed Sep. 18, 2020, which is a non-provisional of, and claims all benefit, including priority to U.S. Application No. 62/901,978, filed Sep. 18, 2019, entitled “ACCESS CONTROL SYSTEM”, all of which are incorporated herein by reference in their entirety.
  • This application is related to U.S. application Ser. No. 16/683,858, filed Nov. 14, 2019, entitled “SECURE COMMUNICATION PLATFORM, incorporated herein by reference in its entirety.
  • FIELD
  • Embodiments of the present disclosure relate to the field of access control, and more specifically, embodiments relate to devices, systems and methods for access control using reduced computing capability computing devices (such as microprocessors and/or microcontrollers).
  • INTRODUCTION
  • Access control management systems (ACMs) are often configured for usage on a legacy communications protocol.
  • Legacy access control systems, in some instances, rely on the physical security provided by a direct, hard-wired connection (e.g., Wiegand, OSDP, etc.) between the components of the access control system and the associated access control readers (e.g., RFID card readers, mobile credential readers, PIN pads, etc.). For example, the Wiegand interface is a wiring protocol that utilizes electrical effects that occur during a short timeframe for signalling (e.g., when a magnetic strip card is presented to a reader device, a series of bits are signalled through modifications of electric current during switches of magnetic state, or via radio frequency identification (RFID) protocols that are used to generate corresponding electrical signals, for example, through induction induced on electronic components of an access badge).
  • Legacy ACMs are prevalent in facility securement. These legacy ACMs typically operate with a set of corresponding access control tokens which are issued to individuals who are authorized to access controlled resources (e.g., enter doors, open data server cabinets, generate authenticated login sessions at computer terminals). The access control tokens can include access fobs (e.g., storing a code accessible by near field communications or inductive coupling). The legacy existing approach presents significant limitations, both in the requirement to run dedicated wiring throughout the building, and that the maximum typical operating distance is less than 100 meters.
  • While the legacy systems may be outdated, the fixed cost of installation has already been incurred and it may be useful to retrofit and modernize the existing infrastructure.
  • SUMMARY
  • It may be desirable to upgrade or retrofit legacy access control devices such that improved digital rules-based systems can interact with the legacy access control devices.
  • As described herein, the upgrade or retrofit is not trivial as technical problems persist in respect of technical signalling challenges. Furthermore, from a practical perspective, the upgrade or retrofit is potentially costly as a large number of devices may be needed, and there may be a desire to utilize lower cost and complexity by incorporating low power/low clock speed microprocessors.
  • While there may be legacy wireless solutions, they typically rely on relatively short-range radio protocols, such as IEEE 802.15, which can eliminate some of the overhead of running existing wiring, but further-reduces the maximum distance between access control hubs and the associated access control readers to a maximum typical operating distance of 10-20 meters. Such a short distance is not desirable and limits the potential application of the system.
  • A retrofit improvement would allow, for example, technology-based restrictions, such as the requirement to have dedicated wiring and a short maximum operating distance, to be overcome. The retrofit improvement includes intercepting signals bound for or from legacy systems, and adding improved infrastructure to utilize, combine, expand, and/or add functionality to the legacy systems.
  • For example, the legacy systems may be coupled with modernized digital backend systems that can provide additional layers of security, including beacon based security, mobile credentials (e.g., those stored on smartphones), integration with directory services, dynamic security shifts (e.g., raised security requirements responsive to a detected breach of a similar technology at an unrelated site detected through news alerts), dynamic failovers (e.g., communications outage, power outage, natural disaster), among others.
  • The retrofit can further allow the overcoming of prior technological barriers, such as wire-based distance limitations (e.g., adding a remote backcountry toolshed accessible to repair technicians to a security infrastructure to be monitored alongside city-based premises), among others. The retrofit also adds the potential for non-security based integration extensibility, such as adding well-ness checks (e.g., temperature monitoring), well-ness declarations, travel-based declarations, and verification of same prior to provisioning access, for example, by cross-referencing location-based data or personnel records.
  • Other potential retrofits include safety-based retrofits (e.g., prior to long-haul truck driver gaining access to a vehicle, alcohol testing via a breath test, or rest/sleep tracking determinations may be required to aid in improving transportation safety). Retrofits can extend functionality in respect of specific use cases, for example, where the identity can be extended to activities associated with secured elements, such as digital evidence lockers adapted for anti-tampering and improved monitoring for law enforcement.
  • However, several technical challenges arise that are addressed by various embodiments described herein. A technical challenge that arises with using legacy communications protocols is that the speed at which the series of bits are signalled through modifications of electric current during the switches of magnetic states requires high timing accuracy by a coupled microprocessor. For example, the width and timing of pulses can be critical.
  • The technical signalling problem associated with legacy systems raises due to legacy access control tokens transmitting their payload asynchronously, for example, via a one-way RFID protocol. This means that the transmitting RFID card, keyfob or similar device is unaware of the receiver's state, and, in particular, it is unaware of the receiver's immediate willingness or ability to receive the transmitted signal, and the receiver is unable to ask the transmitter to pause, repeat or change the speed of the transmission. If the receiver is not immediately able to receive every transmitted value, then one or more parts of the transmission will be lost and unrecoverable (e.g., unable to interpret or incorrectly interpreted). These errors in reception can cause the legacy access control system to either deny entry to an otherwise-authorized individual, could incorrectly raise monitoring alarms related to invalid access attempts.
  • For low power microcontrollers (e.g., those designed to be operated using portable batteries or in regions where power is not steadily available), the controllers have slower clock speeds (e.g., 160 MHz or 16 MHz). As the period of a clock cycle is the inverse of the clock speed, the clock cycles of the low power microcontrollers can be computationally long.
  • While a high power processor can provide enough head room, the long clock cycles of the low power microcontrollers causes a technical problem in relation to achieving the high timing accuracy required by legacy communications protocols, especially where the low power microcontrollers are conducting other functions or the protocol requires narrow pulses (e.g., to provide voltage pulldowns to signal specific bits at approximately 50 us—a single missed pulldown could result in an error). Legacy access control systems make use of door controllers that typically service many readers, which means that interface devices such as this must have the capability of receiving multiple, simultaneous signals.
  • With typical clock speeds and door configurations, this means that a low-power microprocessor would be required to respond to any incoming bits within a small number of clock cycles; during this time the microcontroller must detect a level-change on the Wiegand input, process a software interrupt, sample its ADC to determine the level of the line (“0” or “1”), store the result in an internal data structure, reset the software interrupt settings, and return from the interrupt handler.
  • Processing simultaneous access control events (e.g., two people scanning their access control cards at close to the same time) can consume all available clock cycle budget, leaving no additional capacity for the microcontroller to manage the other device requirements, such as managing network communication, eventing monitoring, encryption, etc.
  • When a low power microcontroller is tasked with multiple simultaneous operations requiring use of on-board computing resources, computational tasks may be delayed in execution, and these delays in execution (e.g., due to execution command congestion) can lead to deleterious effects in respect of generating electrical signals for communication with the legacy protocols or devices due to mistiming. When a signal is mistimed, it can be read incorrectly at the receiving device, and incorrect results may occur (e.g., denial of access to validated individual), as the signalling does not include any error-recovery bits that can be used to recover any lost bits.
  • Another technical problem that could arise in relation to digital integration with improved external cloud-based access control systems includes a need to avoid transmitting plaintext or practically reversible card identifiers or facility identifiers to the external access control systems. By avoiding transmitting plaintext or practically reversible card identifiers or facility identifiers, a potential attack vector is reduced as a malicious attacker cannot use information obtained through intercepting the network connection or through vulnerabilities at the external access control systems. This technical problem can be addressed by the low power microcontrollers described in various embodiments.
  • As described in various embodiments herein, a microcontroller circuit and corresponding circuit topologies, computing systems, methods of operation, and computer program products affixed in the form of non-transitory computer readable memories storing machine-interpretable instruction sets for execution on one or more computer processors are provided.
  • A proposed microcontroller circuit, in accordance with a first aspect, includes a first microprocessor configured for interfacing with a digital access control backend, and a second microprocessor configured for dedicated communications with an access control manager device backend.
  • This proposed approach encompasses four main signaling requirements: (i) it has to receive the incoming signal from a legacy access control token (for example, an RFID card, keyfob or similar device); (ii) it has to transform the signaled token value into a secure form, suitable for remote digital processing (e.g., via secure, one-way hashing, such as HMAC-SHA256) and then securely transmit that event information to the remote digital server (for example, via TLS-secured MQTT protocol); (iii) it has to receive back a secure authentication confirmation from the remote digital server, which must be decrypted, decoded and processed (for example, via TLS-secured MQTT protocol); and, (iv) it must then recreate and transmit the original legacy access control token onwards to the legacy access control system, using the precise format and signal timing that the legacy access control system is configured to accept.
  • In some embodiments, legacy access control devices are not only adapted for retrofit to enable interoperability with improved digital systems, but the access control is extended in respect of adding interconnections to remote devices that could otherwise be impractical to connect. For example, access control devices can be extended to vehicles, remote facilities (e.g., an equipment shed that would otherwise be impractical to connect via physical wiring), among others.
  • The first microprocessor (e.g., an ESP32 system on a chip microprocessor) is a primary (e.g., master) device that controls the operation of the second microprocessor (e.g., an ATMega168 microcontroller having general purpose input/output pins) as a secondary device adapted to receive and process instructions received from the primary device.
  • In particular, the first microprocessor is adapted for conducting digital communications protocols and credential transformation operations. The second microprocessor emulates signals based on command instructions received from the first microprocessor, the emulated signals used for communicating with a legacy ACM system. The first microprocessor, in some embodiments, has greater computing capability than the second microprocessor. Because the second microprocessor is dedicated to communications across the signalling protocol, its ability to provide correctly timed signals is improved.
  • To address the signalling problem, wherein a multi-tasking receiver is required to be immediately ready to receive an incoming signal at any point in time, the proposed design of an embodiment provides one microcontroller that is always ready to process, decode and validate the incoming signals, and generate the timing-dependent outgoing signals, while the other microprocessor (e.g., secondary microprocessor) is able to handle the remaining work of communication with the remote digital server.
  • This eliminates the need to build the solution on larger, more-powerful CPUs that would otherwise need to be scaled for peek demand, which is a significant benefit in both the costs associated with higher-spec devices and the power requirements associated with higher-clockrate CPUs (as the power consumption requirements of a CPU scale approximately with the square of the clockspeed, which means that an implementation that requires 2 times the CPU speed will require 4 times the power in order to run the same application, which can significantly limit the application for solutions that are mobile or may not otherwise have access to continuous external power).
  • A microcontroller system that incorporating the first microprocessor and the second microprocessor provides an interface between access events (e.g., physical or virtual access events) that operate on legacy systems and coupling them to digital backend that provides enhanced user profile/security features. The legacy transaction protocol is translated for two-way communication—in one direction for transmitting access tokens provided by users (e.g., door badging at a panel using a keyfob) and in the other direction for provisioning access (e.g., granting access by releasing a magnetic lock or initiating a secured computer session on a secured graphical user interface). The system may reside on-premises such that data transferred (e.g., facility numbers, card numbers) can be locally stored.
  • The first microprocessor and the second microprocessor are electronically coupled to one another through a messaging bus, and in some embodiments, an additional interrupt line that operates to enable the second microprocessor to communicate event triggers to the first microprocessor (e.g., instead of inefficiently polling).
  • An example physical access could be usage for controlling/denying entry into a building when a key card is presented at a reader. The reader can receive a Wiegand signal from the key card (e.g., as a magnetic strip is run across, a series of electrical pulses are generated, or a corresponding RFID signal) and this signal is sent to the secondary microprocessor to decode and then the decoded message is sent to the master microprocessor, which either authenticates locally (in some embodiments) or authenticates by sending a transformed decoded message to an external authentication mechanism (e.g., an external server).
  • The reader can also receive a Bluetooth signal from a mobile device. Another example access could be usage for controlling/denying connection to a car ignition system. Another example could be usage for reading a keyfob identifier (or some other token) from the car's system. This can be useful in situations where the car already has a legacy keyfob system that has some vulnerabilities or limited utility. As described herein, the car can be extended to be covered in respect of the retrofit system, and car keyfobs can be intercepted and additional verification and authentication is required in respect of security (e.g., adding additional security elements due to prevalence of a suspected relay attack) or non-security-based improvements, such as safety (e.g., alcohol testing) or rest-based requirements (e.g., coupling to a fatigue monitor, such as a smartwatch). Another example includes control of car garage remotes.
  • Upon receipt of a successful authentication message from the external authentication mechanism, the master microprocessor sends an instruction signal to the secondary microprocessor to generate a corresponding signal for controlling the access control provisioning (e.g., in a legacy communication protocol). By transforming the message such that only a securely-hashed version is sent to the external authentication mechanism, the underlying decoded message is not revealed to the external authentication mechanism. An example virtual access could include controlling/denying secured login into a restaurant cashier terminal when a server presents a key card at a reader coupled to the cashier terminal.
  • Secure hashing (such as, but not limited to, SHA-AES256) can be used for communications securement. Secure hashing and a secret key can be integrated together, rendering it practically irreversible and anonymized.
  • The first microprocessor can store local secret keys on-premises, which can be used in conjunction with public keys to be signed and for generation of certificates (e.g., x509 certificates). Accordingly, a hard segregation can be established between the microcontroller system and the external systems.
  • The system described herein can be used, an in embodiment, as a system for providing interoperable access control between a digital backend authentication system and an access control system, the system comprising an interception device (e.g., having the microcontroller systems) configured to intercept physical access requests received from a sensor and to forward the physical access requests to the digital backend authentication system for validation. A receiver interface can be configured to receive authorization signal from the digital backend authentication system to allow a physical access event to proceed; and a protocol transformation engine can be configured to transform the authorization signal and to transmit a transformed authorization signal to the access control system.
  • In another aspect, an additional interrupt connection link is established between the first microprocessor and the second microprocessor to allow for interrupt type signals to be transmitted (e.g., to reduce a need to utilize polling, which could be computationally costly and inefficient to operate).
  • In another aspect, the first microprocessor is coupled to an external authentication mechanism (e.g., external authentication server) and configured to transform received credentials from the second microprocessor. Local credentials (e.g., facility number, card ID number) are transformed (e.g., through the use of secure hashing) prior to communication to the external authentication mechanism.
  • In particular, the transformation of the local credentials allows the ability to avoidance of sending up plaintext/reversible local credentials to the external authentication mechanism. By sending only transformed credentials, the external authentication mechanism is able to authenticate the associated user profiles without having the ability to observe directly the schema or underlying local access credentials. The secure hashing key is shared between the various on-premises devices—via a secure key-sharing algorithm (e.g., public key cryptography, or a variant of Needham-Shroeder)—so that all of the devices can produce an identical transformation (used for later matching the user's physical identity to their digital identity). The secure key sharing is constructed such that an external validation system (e.g., the cloud service) is unable to discover or recover the on-premises key.
  • In a further aspect, the first microprocessor is configured to maintain a rolling secret stored in a local data structure whose corresponding key is periodically provided to the external authentication server. By utilizing a rolling secret maintained locally, the threat of malicious access event emulation at the external authentication mechanism level can be reduced once the rolling secret has rolled over. The rolling secret, for example, can include a private symmetric key that is used to generate a message to the external authentication server with the key (e.g., generated based on a magic #, a sequence #, a facility #, a card #), etc. The external authentication server receives the transformed credentials (e.g., a securely-hashed value, generated from the underlying credentials), which it can process and something it is not capable of processing or generating (a token generated from the rolling secret).
  • In another aspect, the first microprocessor and the second microprocessor are configured for offline usage when disconnected from the external authentication server. The online usage capabilities can be limited. For example, the first microprocessor may be coupled to a data storage storing a cyclical buffer of previous successful access attempts and even if disconnected from the external authentication server, those authenticated profiles, upon the first microcontroller receiving a corresponding correct input from the ACM to the second microcontroller, can generate control signals provisioning or denying access to a controlled resource.
  • In another aspect, memory regions of data storage coupled to or residing on the first microprocessor can be used for avoiding the need for explicit time stamping through a re-use of the memory region marking mechanism. This mechanism is particularly useful where the clocks on the first or the second microprocessor (or both) cannot be relied upon to provide accurate timestamps (this issue arises in respect of low cost and low-power implementations, such as timestamp slippage or a poorly synchronized local clock), or if the microprocessors simply don't have clocks.
  • A compiler instruction can be used to mark memory as non-initialized—on initial power on, the system sets a flag to 0, once the system obtains network connectivity, it periodically updates a RAM based standard variable with the time. When the system restarts, the microprocessor takes that time and loads the time into the system clock. Accordingly, the microcontroller is able to maintain a view of current time across reboots or software failures without a battery, clock, etc.
  • DESCRIPTION OF THE FIGURES
  • In the figures, embodiments are illustrated by way of example. It is to be expressly understood that the description and figures are only for the purpose of illustration and as an aid to understanding.
  • Embodiments will now be described, by way of example only, with reference to the attached figures, wherein in the figures:
  • FIG. 1 is a block schematic diagram of an example system for access control, according to some embodiments.
  • FIG. 2 is an example method diagram showing an example method for access control, according to some embodiments.
  • FIG. 3 is an example computing device, according to some embodiments.
  • FIG. 4 is a diagram showing an example retrofit system, according to some embodiments.
  • FIG. 5 is an example block schematic showing a more complex system, according to some embodiments.
  • FIG. 6 is a block schematic showing a system being extended to provide protection in respect of a vehicle, according to some embodiments.
  • FIG. 7 is a electrical pulse diagram of signals associated with a set of example doors, according to some embodiments.
  • FIG. 8 is a second electrical pulse diagram of signals associated with a set of example doors, according to some embodiments.
  • DETAILED DESCRIPTION
  • Legacy approaches, whether wired or wireless, suffer from limitations that hamper adoption of traditional physical access-control technologies in modern, distributed corporate environments: (i) authentication of end-users must take place at fixed locations, limiting the ability to utilize traditional physical access-control technologies in mobile applications; (ii) those fixed locations must be in relatively close physical proximity to the other components of the enterprise's access control system, limiting the ability to utilize traditional physical access-control technologies in environments with widely-distributed assets; (iii) most existing signalling mechanisms utilized by access control systems (e.g., dedicated wiring or point-to-point wireless) cannot be monitored or protected with the infrastructure that enterprises typically use to monitor and protect their existing digital networks that connect their other data, digital-security and IoT networks; (iv) existing access control technologies typically require one-to-one connections between access control readers and access control panels, which means that increasing the number of secured assets/access-points typically involves the significant additional financial and labour cost of installing additional access control panels, etc.; and, (v) the one-to-one connections of existing access control technologies limit enterprises that manage multiple locations from maintaining consolidated views and monitoring of access control events.
  • A technical challenge that arises with using legacy communications protocols is that the speed at which the series of bits are signalled through modifications of electric current during the switches of magnetic states (or using RFID) requires high timing accuracy by a coupled microprocessor. For example, the width and timing of pulses can be critical. This level of timing accuracy can be important, for example, where the legacy communications protocols utilize coded signals such as specifically modulated radio waves (e.g., keyfobs operating at 315 MHz or approximately 433 MHz), modulated, for example, using amplitude-shift keying. In the context of RFID devices (access cards, car keyfobs, etc.), these devices simply blindly transmit signals without any flow control that would permit the receiver to delay or control the timing of the input from the RFID devices.
  • The primary problem is that legacy access control tokens transmit their payload asynchronously, typically via a one-way RFID protocol. This means that the transmitting RFID card, keyfob or similar device is unaware of the receiver's state, and, in particular, it is unaware of the receiver's immediate willingness or ability to receive the transmitted signal, and the receiver is unable to ask the transmitter to pause, repeat or change the speed of the transmission. If the receiver is not immediately able to receive every transmitted value, then one or more parts of the transmission will be lost and unrecoverable.
  • If any portions of the transmitted signal are lost, then the receiver will either be unable to interpret the transmitted credential, or it may incorrectly interpret the transmitted credential value as another, shorter value (e.g., if 6 bits are lost from a 32-bit credential transmission, it may be incorrectly received as a different, but valid-looking 26-bit credential transmission). These errors in reception can cause the legacy access control system to either deny entry to an otherwise-authorized individual, could incorrectly raise monitoring alarms related to invalid access attempts.
  • Additionally, in the case where a reception error causes the transmitted credential of Person A to be misinterpreted as a different credential value associated with Person B; in this case, it could inadvertently allow Person A to gain access to a facility with the credentials and access rights of Person B.
  • For low power microcontrollers (e.g., those designed to be operated using portable batteries or in regions where power is not steadily available), the controllers have slower clock speeds (e.g., 160 MHz or 16 MHz). Without being able to delay or control the timing of the input from the RFID devices, it is challenging to utilize slower clock speed microprocessors as a signal mistiming can render a device inoperable or cause poor operation as signals are not processed properly.
  • By utilizing network communication layers (e.g., Ethernet, IEEE 802.11 wireless, cellular data), a proposed microcontroller-based solution is described herein that allows existing physical access control systems and the associated access control readers (or access controllers, such as vehicular locks, garage door openers, cabinet latches) to be readily retrofitted to support mobile and/or geographically-dispersed environments with limited or without any additional changes to or reconfiguration of the existing system components. The approaches described herein are adapted to address technical problems associated with using electronic devices having limited computational functionality, such as limited power and/or clock speed.
  • Additionally, by utilizing network communication protocols (i.e., TCP/IP), this proposed microcontroller-based solution allows existing physical access control systems to be readily retrofitted to allow monitoring and protection through an enterprise's existing network monitoring systems, potentially without requiring any changes (e.g., significant changes) to the existing access control readers or systems. This allows an enhanced range of potential retrofits, including, for example, vehicle keyfobs, storage cabinet keypads, among others.
  • For example, a retrofit solution described herein provides a practical, low cost approach for addressing weaknesses with existing implementations (e.g., adding layers of security to overcome a vulnerability to a keyfob “relay attack”) using low clock speed microprocessors. Similarly, extending functionality is also possible where, for example, one wishes to add mobile credential processing capabilities, well-ness checks, connections to actively managed directory service or digital security infrastructure, etc., to existing infrastructure without needing to re-wire existing readers.
  • Additionally, one remotely-situated microcontroller-based device, connected to an access control reader, may be configured to readily retrofit existing physical access control systems to permit mobile applications, without requiring any changes to the existing access control readers or systems; it can facilitate this by securely relaying an encrypted, time-limited representation of the end-user's authenticated access credential to a centrally-located microcontroller-based device that is connected to the enterprise's existing physical access control system, using standard network communication layer(s) and protocols. The microcontroller-based device can be electronically coupled to the access control reader, for example, as an additional component connected through wiring or wireless connectively that operates as an agent or intercepts signals to a backend access provisioning controller that ultimately grants or denies access by controlling the operation of a door or a latch.
  • In an embodiment, many remotely-situated microcontroller-based devices, connected to access control readers, are configured to relay end-users' authenticated access credentials to one centrally-located microcontroller-based device connected to a single traditional access control panel, thereby eliminating or reducing the traditional scaling costs associated with adding a large number of access points, without requiring any changes to the existing access control readers or systems.
  • A microcontroller-based device, connected to an access control reader, may be configured to relay end-users' authenticated access credentials to multiple microcontroller-based devices that are each connected to individual access control systems. This can permit access events at a plethora of locations to be mirrored and consolidated into one central location, without requiring any changes to the existing access control readers or systems, which provides for greatly-simplified, standardized monitoring of access events, reducing the cost and complexity of alternative approaches for retrofits. To address the signalling problem, wherein a multi-tasking receiver is required to be immediately ready to receive an incoming signal at any point in time, the proposed design of various embodiments uses one microcontroller that is always ready to process, decode and validate the incoming signals, and generate the timing-dependent outgoing signals, while the other microprocessor is able to handle the remaining work of communication with the remote digital server.
  • This eliminates the need to build the solution on larger, more-powerful CPUs that would otherwise need to be scaled for peek demand, which is a significant benefit in both the costs associated with higher-spec devices and the power requirements associated with higher-clockrate CPUs (as the power consumption requirements of a CPU scale approximately with the square of the clockspeed, which means that an implementation that requires 2 times the CPU speed will require 4 times the power in order to run the same application, which can significantly limit the application for solutions that are mobile or may not otherwise have access to continuous external power).
  • FIG. 1 is an example block schematic diagram of an example system for access control, according to some embodiments.
  • In FIG. 1 , system 100 is shown as an on-premises device that is coupled to legacy access control mechanisms on one end and coupled to an external verification system. Coupling to legacy access control mechanisms is challenging with low-power or low-clock speed microprocessors as there is a high level of accuracy required for accurate communications.
  • System 100 can also be placed on remote locations, in other embodiments, such as being coupled to vehicular locks, garage door openers, cabinets/lockers, among others. The vehicular lock system may be expecting a coded series of pulses at a particular frequency from a keyfob to be received prior to unlocking a door or allowing ignition of an engine.
  • As the period of a clock cycle is the inverse of the clock speed, the clock cycles of the low power microcontrollers can be computationally long. While a high power processor can provide enough head room, the long clock cycles of the low power microcontrollers causes a technical problem in relation to achieving the high timing accuracy required by legacy communications protocols, especially where the low power microcontrollers are conducting other functions or the protocol requires narrow pulses (e.g., to provide voltage pulldowns to signal specific bits at approximately 50 us—a single missed pulldown could result in an error).
  • In particular, when an error is encountered, the legacy system may simply not respond or throw an error signal, resulting in an individual either obtaining access when access is not warranted or not obtaining access although authenticated successfully.
  • A reason why low clock speed/low power microprocessors are desirable for these applications is that it is not always possible to incur the expense of higher power microprocessors, or that higher power microprocessors require increased power or cooling mechanisms.
  • For example, in certain situations, a low clock speed microprocessor is favourable as it is able to operate on portable energy sources (such as batteries) for extended periods of time (e.g., >5 days), which is a distinct advantage in locales where power is not readily or consistently available. In certain implementations, the facilities may simply not have power outlets near the access control devices and they must operate on portable energy sources. Low clock speed microprocessors also have a benefit of being compact in volume and weight, which allows for an increased ease of deployment.
  • When a low power microcontroller is tasked with multiple simultaneous operations requiring use of on-board computing resources, computational tasks may be delayed in execution, and these delays in execution (e.g., due to execution command congestion) can lead to deleterious effects in respect of generating electrical signals for communication with the legacy protocols or devices due to mistiming. When a signal is mistimed, it can be read incorrectly at the receiving device, and incorrect results may occur (e.g., denial of access to validated individual).
  • For example, a signal requiring 50+/−5 us in accuracy could be delayed in transmission due to instruction congestion/backlog. For a legacy system where a delay in 50 us leads to a completely different signal from being received, there may be a corresponding inaccuracy due to the delay at the receiver system.
  • As described in various embodiments herein, a microcontroller circuit 100 and corresponding circuit topologies, computing systems, methods of operation, and computer program products affixed in the form of non-transitory computer readable memories storing machine-interpretable instruction sets for execution on one or more computer processors is provided. The machine-interpretable instruction sets can be adapted as computer program products for execution on the one or more computer processors.
  • The circuit 100 is adapted to address four main signaling requirements: (i) it has to receive the incoming signal from a legacy access control token (for example, an RFID card, keyfob or similar device); (ii) it has to transform the signaled token value into a secure form, suitable for remote digital processing (e.g., via secure, one-way hashing, such as HMAC-SHA256) and then securely transmit that event information to the remote digital server (for example, via TLS-secured MQTT protocol); (iii) it has to receive back a secure authentication confirmation from the remote digital server, which must be decrypted, decoded and processed (for example, via TLS-secured MQTT protocol); and, (iv) it must then recreate and transmit the original legacy access control token onwards to the legacy access control system, using the precise format and signal timing that the legacy access control system is configured to accept.
  • A proposed device (e.g., a microcontroller circuit) 100, in accordance with a first aspect, includes a first microprocessor 102 configured for interfacing with a digital access control backend 104, and a second microprocessor 106 configured for dedicated communications with an access control manager device backend.
  • The first microprocessor 102 (e.g., an ESP32 system on a chip microprocessor) is a master device that controls the operation of the second microprocessor 106 (e.g., an ATMega168 microcontroller having general purpose input/output pins) as a secondary device.
  • In particular, the first microprocessor 102 is adapted for conducting digital communications protocols and credential transformation operations. The second microprocessor 106 emulates signals based on command instructions received from the first microprocessor 102, the emulated signals used for communicating with a legacy ACM system. The first microprocessor 102, in some embodiments, has greater computing capability than the second microprocessor 106. In another embodiment, both the first microprocessor 102 and the second microprocessor 106 can have the same or similar computing specifications. Because the second microprocessor 106 is dedicated to communications across the signalling protocol, its ability to provide correctly timed signals is improved.
  • A microcontroller system 100 incorporating the first microprocessor 102 and the second microprocessor 106 provides an interface between access events (e.g., physical or virtual access events) that operate on legacy systems and coupling them to digital backend that provides enhanced user profile/security features.
  • The legacy transaction protocol is translated for two-way communication—in one direction for transmitting access tokens provided by users (e.g., door badging at a panel using a key fob) and in the other direction for provisioning access (e.g., granting access by releasing a magnetic lock or initiating a secured computer session on a secured graphical user interface). The legacy transaction protocol can, in some embodiments, be based on analog signals that are shaped to reflect a digital signal being communicated. For example, the analog signals may be reproduced with digital bits signalled through corresponding voltage pulldowns which signal digital bits (e.g., 0 or 1).
  • The legacy transaction protocol may interact with specific protocols such that a reader will be able to read from the analog signal characteristics the digital signal. The digital signal can, in some embodiments, be a representation of a characteristics of the badge access event device or the person associated with the access badge, such as age, sex, title, facility code, client code, among others.
  • The system may reside on-premises such that data transferred (e.g., facility numbers, card numbers) can be locally stored.
  • The first microprocessor 102 and the second microprocessor 106 are electronically coupled to one another through a messaging bus 108, and in some embodiments, an additional interrupt line 110 that operates to enable the second microprocessor 106 to communicate event triggers to the first microprocessor 102 (e.g., instead of inefficiently polling). The message bus 108 can be, for example, based on a 120 architecture.
  • The interrupt line 110 can be a signal path that is designed for level triggering or edge triggering, and for example, can be a signal path having a voltage that is pulled down or up whenever an interrupt signal is being established. The interrupt signal, in this example, can indicate to the master first microprocessor 102 that an authentication attempt is underway at the device coupled to second microprocessor 106, rather than having the first microprocessor 102 continually poll the second microprocessor 106 to query whether such signal is present.
  • An example physical access controlled by second microprocessor 106 could be used for controlling/denying entry into a building when a key card is presented at a reader. When the key card (or other key token, such as a key fob) or other credentials are presented at the reader, an authentication challenge response signal can be transmitted. The authentication challenge response signal can be as simple as a card ID #associated with the key card, or more complex signals such as rolling codes that are generated based on a shared secret between the key token and the reader (e.g., a rolling code approach).
  • In legacy systems, the reader may be configured to receive a Wiegand signal from the key card (e.g., as a magnetic strip is run across or an RFID card is presented, a series of electrical pulses are generated) and this signal is sent to the secondary microprocessor (second microprocessor 106) to decode and then the decoded message is sent to the master microprocessor (first microprocessor 102), which either authenticates locally (in some embodiments) or authenticates by sending a transformed decoded message to an external authentication mechanism 112 (e.g., an external server).
  • The external authentication mechanism 112 can include a cloud-based server implementation which is coupled to a user profile matching engine. The cloud-based server implementation can incorporate processing rules which are adapted to generating digital rules-based architecture for determining access provisioning decisions.
  • Accordingly, complex decision making can be established despite the presence of legacy systems, and in accordance with various embodiments herein. Complex decision making can include time-based rules, machine learning based determinations, combinations with step up authentication (e.g., usage of combinations with other modalities where there is a potential for false positives or inconclusive authentication).
  • For example, a user who should otherwise be authenticated for access at 8 AM attempts access at 2 AM. The system may detect a correct authentication and key token presented at the reader, but for this user profile, the external authentication mechanism 112 may control an additional authentication to occur to request a fingerprint to add to an overall holistic determination of authentication.
  • Upon receipt of a successful authentication message from the external authentication mechanism 112, the master microprocessor (first microprocessor 102) sends an instruction signal to the secondary microprocessor (second microprocessor 106) to generate a corresponding signal for controlling the access control provisioning (e.g., in a legacy communication protocol).
  • By transforming the message such that only a securely hashed version is sent to the external authentication mechanism 112, the underlying decoded message is not revealed to the external authentication mechanism 112. For example, the information is securely hashed based on a key that is only stored on-premises and thus never transferred to the external authentication mechanism 112. An example virtual access could include controlling/denying secured login into a restaurant cashier terminal when a server presents a key card at a reader coupled to the cashier terminal.
  • The key card could provide an initial facility code and a card ID, and this information may be received by the second microprocessor 106, decoded, and passed to first microprocessor 102. The first microprocessor 102 then securely hashes and transforms the data, and only the transformed data is sent to the external authentication mechanism 112.
  • The first microprocessor 102 can store local secret keys on-premises, which can be used in conjunction with public keys to be signed and for generation of certificates (e.g., x509 certificates). Accordingly, a hard segregation can be established between the microcontroller system and the external systems.
  • In another aspect, an additional interrupt connection link is established between the first microprocessor 102 and the second microprocessor 106 to allow for interrupt type signals to be transmitted (e.g., to reduce a need to utilize polling, which could be computationally costly and inefficient to operate).
  • This interrupt connection link is a technical improvement that is adapted for communication for controlling the second microprocessor 106. Other bus protocols (for example, I2C) have a technical deficiency as the protocol is not adapted to allow a secondary device (e.g., a “slave”) device (such as a microcontroller receiving Wiegand signals) to initiate communication with the primary “master” device (e.g., the primary microcontroller).
  • This means that the second microprocessor 106 would normally have no way of announcing that a new scan (e.g., card scan) has occurred. Using a naïve implementation of 120, the first microcontroller 102 would need to continuously poll the second microprocessor 106 to determine if anything has arrived. This approach would introduce two technical problems: (i) it delays the real-time processing of the user's card scan; and, (ii) the polling requests from the “master” all add additional overhead to the second microcontroller 106, which increases the likelihood of missing incoming signal bits (e.g., Wiegand bits), causing a miscommunication error.
  • In another aspect, the first microprocessor 102 is coupled to an external authentication mechanism 112 (e.g., external authentication server) and configured to transform received credentials from the second microprocessor 106. Local credentials (e.g., facility number, card ID number) are transformed (e.g., through the use of public key encryption or secure hashing) prior to communication to the external authentication mechanism 112.
  • In particular, the transformation of the local credentials allows the ability to avoidance of sending up plaintext/reversible local credentials to the external authentication mechanism 112. By sending only transformed credentials, the external authentication mechanism 112 is able to authenticate the associated user profiles without having the ability to observe directly the schema or underlying local access credentials.
  • In a further aspect, the first microprocessor 102 is configured to maintain a rolling secret stored in a local data structure whose corresponding key is periodically provided to the external authentication server. By utilizing a rolling secret maintained locally and periodically transmitted, the threat of malicious access event emulation at the external authentication mechanism 112 level can be reduced once the rolling secret has rolled over.
  • The rolling secret, for example, can include a private symmetric key that is used to generate a message to the external authentication server with the key (e.g., generated based on a magic #, a sequence #, a facility #, a card #), etc. The external authentication server receives the transformed credentials (e.g., a cookie generated from the underlying credentials), which it can process and something it is not capable of processing or generating (a token generated from the rolling secret).
  • In another aspect, the first microprocessor 102 and the second microprocessor 106 are configured for offline usage when disconnected from the external authentication server.
  • The online usage capabilities can be limited. For example, the first microprocessor 102 may be coupled to a data storage storing a cyclical buffer of previous successful access attempts and even if disconnected from the external authentication server, those authenticated profiles, upon the first microcontroller receiving a corresponding correct input from the ACM to the second microcontroller, can generate control signals provisioning or denying access to a controlled resource.
  • In another aspect, memory regions of data storage coupled to or residing on the first microprocessor 102 can be used for avoiding the need for explicit time stamping through a re-use of the memory region marking mechanism. This mechanism is particularly useful where the clocks on the first or the second microprocessor 106 (or both) cannot be relied upon to provide accurate timestamps (this issue arises in respect of low cost and low-power implementations, such as timestamp slippage or a poorly synchronized local clock), or if the microprocessors simply don't have clocks.
  • A security log may also persist across reboots, without requiring the use of flash memory. Flash memory is typically the only storage medium available on these low-power devices (i.e., they don't have hard drives) and flash memory will burn out and become unusable after anywhere from 250 k to 1M write-cycles which makes it infeasible for maintaining constantly-changing logs.
  • The “typical” approach is to use a large amount of flash memory and use “wear-levelling” techniques to try to maximize the lifetime of the flash chips. The approach described herein maintains the required data structures needed for secure operation—without the need for operations that ultimately degrade the on-device flash memory.
  • A compiler instruction can be used to mark memory as non-initialized—on initial power on, the system sets a flag to 0, once the system obtains network connectivity, it periodically updates a RAM based standard variable with the time. When the system restarts, the microprocessor takes that time and loads the time into the system clock. Accordingly, the microcontroller is able to maintain a view of current time without a battery, clock, etc.
  • In some embodiments, it is critical to maintain logs of access events, for audit and security purposes. This requires accurate timestamps to be maintained for any access events or exceptions—especially during events where someone may be attempting to tamper with the system by interrupting network connectivity, or where mobile implementations might not have network connectivity (e.g., in a parking garage or remote location).
  • A naive approach would be to put a clock and a battery into the device—but that requires periodic maintenance of the battery (or limits the service lifetime of the device).
  • FIG. 2 is an example method diagram showing an example method 200 for access control, according to some embodiments, showing example steps 202-210, which are non-limiting and other, different, alternate steps are possible. At 202, a token or signals from a token are presented at a legacy reader, and the secondary (e.g., slave) limited clock speed microprocessor receives the signals and decodes the signals. The signals, for example, can include authentication short width electrical pulses from that are received at a physical token reader. These signals are intercepted at the point of presentation and processed by the secondary limited clock speed microprocessor.
  • At 204, this decoded message is then provided in the form of a decoded identifier data value to the primary limited clock speed microprocessor. The primary limited clock speed microprocessor can interact with an external authentication server by first converting the decoded message into a hashed representation and submitting the hashed representation to the external authentication server. By generating the hashed representation, the actual identifier associated with the user's identifier token need not be transmitted openly to the external authentication server, removing a source of cybersecurity risk.
  • At 206, the external authentication server processes the hashed representation to make an access provisioning determination. In some embodiments, this can include extended functionality prior to making the determination, such as controlling a mobile device to conduct other assessments in respect of location of the mobile device, requiring the entering of a password, among others. In another embodiment, the external authentication server compares the user identifier against an access control list, such as an active directory and various logical conditions thereof. For example, the external authentication server may require that a waiver has been filed on record, or a wellness declaration and temperature score below a particular threshold having been saved on record. At 208, the access provisioning signal 208 is received by the primary limited clock speed microprocessor, which at 210, controls the secondary limited clock speed microprocessor to conduct an actuation to allow access to various protected resources. In some embodiments, instead of controlling the secondary limited clock speed microprocessor, the primary limited clock speed microprocessor itself conduct an actuation to allow access to various protected resources. Providing access can include unlocking a door, unlocking electronic access to an electronic account, unlatching a cabinet door, open a garage door, unlocking a vehicle's ignition, etc.
  • FIG. 3 is an example computing device 300, according to some embodiments. The computing device 300 is an example microprocessor or microcontroller, and the device 300 can include a computer processor 302, memory 304 (e.g., read only memory, random access memory), an input/output interface 306 (e.g., I/O pins), and an interface 308 for communication, for example, with a message bus. The computer processor 302 can be configured to interpret machine-interpretable instructions stored on a non-transitory computer readable medium, and to execute a method for access control in accordance with methods described in embodiments herein.
  • FIG. 4 is a diagram showing an example retrofit system, according to some embodiments. In diagram 400, an existing card reader 402, is augmented by a backend control unit 408 that can, for example, be a system 100 that operates to intercept signals as described in various embodiments herein. The system 100 includes at least two low clock speed microprocessors that operate with one another to coordinate messaging using legacy protocols where one of the low clock speed microprocessors is dedicated to signal emulation in respect of received signals and/or access control provisioning signals. Accordingly, a person may present his/her key card to the reader 402.
  • A signal may be provided, for example, through electrical coupling of the key card to the reader 402 (e.g., a series of electrical pulses). The signal may be intercepted by the system 100 and read by a secondary, dedicated low clock speed microprocessor for generating an identity data object from the information adduced (e.g., converting the series of electrical pulses into an identity value). This data object is then provided to a primary low clock speed microprocessor that generates a representation of this data object (e.g., a one way hashed version of the identity value) for transmission across network 450 to a backend digital access control manager 104 that can be coupled to one or more external databases.
  • For example, backend digital access control manager 104 can include digital access controls that utilize an active directory service for improved control and authentication of the user. In this example, backend digital access control manager 104 can interoperate with a mobile device having a secure repository for credential storage 405 and require an increased mobile credential 406 to be asserted in certain situations when the key card is presented to the reader 402. For example, this can be required at a first usage of the key card, or when a security level has been increased (e.g., a pattern of breaches have been noticed in the news). The mobile credential 406 can include various tokens or data objects, such as data packets having biometric information, password information, etc. In some embodiments, mobile credential 406 is related to requirements relating to wellness checks or other physical characteristics, such as requiring a declaration in respect of recent travel, recent location information from the device (e.g., to indicate that no recent travel has occurred), temperature readings (e.g., from a coupled biometric device), among others.
  • Upon authentication, the backend digital access control manager 104 can provide a corresponding authenticated data object to the primary low clock speed microprocessor, which can then decode and securely transmit an instruction command to the secondary low clock speed microprocessor. In some embodiments, the secondary low clock speed microprocessor can emulate an authenticated signal based on a series of emulated codes and pulses to interoperate with the legacy system to provide access to the secured resource (e.g., unlocking door latch or magnetic closure device).
  • In some embodiments, the device of FIG. 4 , instead of being a retrofit, can include an extension of a legacy system. In this example, a card reader 402 can be installed at a remote site, such as an inventory shed, that can be difficult or impractical to connect via wiring. The system 100 can emulate the signals to a wired panel coupled to the legacy system to enable interoperability.
  • FIG. 4 is a simplified example; in some embodiments, the card reader 402 is coupled to a plurality of access controllers (e.g., doors, lockers) in the legacy implementation. The signalling challenge here is exacerbated as the card reader 402 can receive multiple signals from access attempts at the plurality of doors and signal timing becomes even more important. In such a situation, an implementation with a single lock clock speed microprocessor may become overwhelmed by multiple tasks and may miss actuations (or even worse, misinterpret actuations and inadvertently allow access). A reader 402 to many secured access element (i.e., 1:n) situation can occur, for example, where the secured resource is an evidence locker having many doors (e.g., evidence from crime scene A, B, C each having their own section). Other situations are also possible, such as three readers 402 servicing fifteen secured resources.
  • FIG. 5 is an example block schematic showing a more complex system, according to some embodiments. In this example, diagram 500 shows a facility having a legacy system device 502, 509 that is extended with additional beaconing devices 504, 510, 512. These beacon devices 504, 510, 512 are utilized in conjunction, for example, with a security camera or motion sensor 505 and a mobile device to ensure that a coupled mobile device is in a physical vicinity of the legacy system device 502, 509 in addition to simply providing a key card. This is useful where a stolen key card is being utilized. By requiring the mobile device is in a physical vicinity of the legacy system device, the stolen key card is more difficult to use without the rightful owner being present. The legacy system devices 502, 509 can be extended with a system 100 as described in various embodiments. In an example, the legacy system devices 502, 509 can both be serviced by a single backend reader 402 that is coupled to both and receives/processes signals from both, sending actuation signals directly to the corresponding access provisioning mechanism (e.g., mantrap revolving door, door latch).
  • The primary microprocessor can interoperate with the beacon devices and/or a digital backend, and control the secondary microprocessor for interoperation with the legacy system device 502, 509 (e.g., signal interception and emulation both at the credential interaction level and the access granting level, respectively). A series of pulses can be intercepted, processed with an additional level of scrutiny, and upon successful authentication at the higher level of scrutiny, a successful validation can be emulated and utilized for granting access to the secured resource 514 (in an example, a server room). The beacon signals, for example, when received by the mobile device can be converted into distance estimations (e.g., −25 dB, −26 dB) so that the person has an additional level of validation by having the mobile device relay rolling codes along with the distance estimations as part of the validation process.
  • A variation can include utilizing the system to be extended to garage doors, remote gates, among others. Supporting remote locations require the devices to manage a secure, encrypted network communication (to maintain a link to the centralized access control system). This raises similar technical issues as noted in various sections herein: the overhead of managing those interactions can interfere with the hard real-time requirements involved with capturing the incoming signals from access control tokens.
  • As a further example, this proposed solution would allow a large number of new access-controlled spaces to be added to an existing access control system, without requiring the corresponding costs that would be traditionally associated with expanding the central access control system. In this implementation a large number of access-controlled cabinets, such as a set of evidence lockers 516, could be connected to one or more microcontroller-based devices.
  • Each of the evidence lockers 516 can be coupled to a legacy reader, and an additional extension may include, for example, access control devices that could be connected to a traditional access control reader to receive user credentials, and a traditional PIN pad to allow the user to enter the locker number.
  • Once the end-user's credential is authenticated, the microcontroller-based device would close an attached electrical relay, thereby unlocking the selected locker 516. This permits a plethora of spaces to be securely controlled by a central access control system, without requiring any changes to the existing access control readers or system, and without the costs of scaling the central access control system.
  • FIG. 6 is a block schematic showing a system being extended to provide protection in respect of a vehicle, according to some embodiments. System 600 in this example is a premises-based security system that is extended to provide improved authentication and validation in respect of a vehicle. In this example, a keyfob 680 can be presented to a legacy validation/lock device 606. The legacy validation/lock device 606, in a naïve implementation, is vulnerable to a relay attack where the keyfob 680's signal is instead of being proximate, is relayed by a pair of malicious users operating in tandem.
  • The digital system 600 can be utilized along with components of the device described in system 100 to provide an efficient and effective retrofit solution to intercept and emulate signals to provide additional layers of security or validation prior to unlocking a door or ignition. As noted herein, additional layers of validation can include declarations or indications in respect of rest (e.g., for truck drivers, a data object representing their sleeping/movement patterns), or in respect of drug testing (e.g., intoxication).
  • In this implementation, a microcontroller-based device mounted inside the vehicle would be attached to a traditional access control reader for receiving end-user credentials, and a modem (e.g., cellular) for network connectivity back to the access control system. Once the end-user's credential is authenticated, the microcontroller-based device would close an attached electrical relay, thereby enabling the vehicle's existing ignition system.
  • Additionally, the microcontroller-based device can retain a local cache of the end-user credential inside a local cache, to permit subsequent re-authentication of the user, even if the vehicle is outside of cellular range (e.g., in an underground parking garage). This permits access to a remote, mobile vehicle to be securely controlled by a central access control system, without requiring any changes to the existing access control readers or system.
  • As a further example, this proposed solution would allow an existing access control system to be extended to remote locations that cannot be served by traditional, centralized wired/wireless solutions. In this implementation, a microcontroller-based device mounted at a remote location would be attached to a traditional access control reader for receiving end-user credentials, and a modem (e.g., cellular) for network connectivity back to the access control system.
  • Once the end-user's credential is authenticated, the microcontroller-based device would close an attached electrical relay, thereby unlocking the door (e.g., releasing a maglock, an electrically-controlled door strike, or an electrically-controlled mortise lockset). This permits the remote location to be securely controlled by a central access control system, without requiring any changes to the existing access control readers or system.
  • The system 100 provides a low cost system that can be used for a wide retrofit, and accordingly, an existing access control system to be extended into automotive vehicles, to permit those systems to control the remote access to vehicle fleets, in order to ensure that drivers are authorized employees and/or have proper training (e.g., hazardous vehicle operators).
  • FIG. 7 is a electrical pulse diagram of signals associated with a set of example doors, according to some embodiments. In diagram 700, a set of four doors are shown, with pulses associated with Wiegand 0 and 1 actuations.
  • Legacy access control systems make use of door controllers that typically service many readers, which means that interface devices such as this must have the capability of receiving multiple, simultaneous signals, as shown in FIG. 7 .
  • FIG. 8 is a second electrical pulse diagram of signals associated with a set of example doors, according to some embodiments. In this example diagram 800, a microcontroller is shown to be tasked with various decoding tasks in a short 50 us window.
  • With typical clock speeds and door configurations, this means that a low-power microprocessor would be required to respond to any incoming bits within a small number of clock cycles, as shown in FIG. 8 ; during this time the microcontroller must detect a level-change on the Wiegand input, process a software interrupt, sample its ADC to determine the level of the line (“0” or “1”), store the result in an internal data structure, reset the software interrupt settings, and return from the interrupt handler.
  • As noted in this diagram 700, the pulses have very short durations of time in which they can be processed, and a missed duration or a mis-timed actuation could lead to a miscommunicated or uninterpretable signal.
  • It is important to note that not all embodiments are limited to Wiegand, and other protocols that have similar timing accuracy considerations are also contemplated. Incoming pulses can be read by the secondary microprocessor for decoding a message provided by a keyfob and intercepted. The secondary microprocessor can, upon a successful authentication, be controlled to emulate the access pulses to the legacy system, for example, controlling electronic circuits to generate a corresponding set of pulses as if the system was encountering the keyfob.
  • The term “connected” or “coupled to” may include both direct coupling (in which two elements that are coupled to each other contact each other) and indirect coupling (in which at least one additional element is located between the two elements).
  • Although the embodiments have been described in detail, it should be understood that various changes, substitutions and alterations can be made herein without departing from the scope. Moreover, the scope of the present application is not intended to be limited to the particular embodiments of the process, machine, manufacture, composition of matter, means, methods and steps described in the specification.
  • As one of ordinary skill in the art will readily appreciate from the disclosure, processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed, that perform substantially the same function or achieve substantially the same result as the corresponding embodiments described herein 5 may be utilized. Accordingly, the embodiments are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps.
  • As can be understood, the examples described above and illustrated are intended to be exemplary only.

Claims (20)

What is claimed is:
1. A device for controlling access to one or more protected resources, the device comprising:
a secondary microprocessor coupled to a physical access control device, the secondary microprocessor configured for receiving and decoding authentication electrical pulses from a user credential reader as when a user credential interacts with the user credential reader to generate corresponding user identifier data values, and the secondary microprocessor configured for transmitting electrical pulse signals to an access control management device that provisions access to the one or more protected resources;
a master microprocessor coupled to an external authentication server and the secondary microprocessor, the master microprocessor configured to:
receive the corresponding user identifier data values;
transform the user identifier data values using a cryptographic function to generate a transformed representation for communication to the transformed representation to the external authentication server;
receive an access provisioning signal from the external authentication server; and
transmit an instruction signal to the secondary microprocessor to control the secondary microprocessor to provision access to the one or more protected resources;
wherein the secondary microprocessor and the master microprocessor are coupled to one another across a message bus connection and a separate signal path, the signal path enabling communication from the secondary microprocessor to the master microprocessor for indicating when the user credential interacts with the user credential reader; and
wherein said user credential is associated with an entity, and wherein receiving said access provisioning signal from said external authentication server is based on whether a mobile communication device associated with said entity is within a threshold distance of said user credential reader when said user credential interacts with said user credential reader.
2. The device of claim 1, wherein the user credential is a local credential that is not provided to or accessible directly by the external authentication server.
3. The device of claim 2, wherein the cryptographic function used to transform the local credential is a private symmetric key.
4. The device of claim 2, wherein the cryptographic function used to transform the local credential is an asymmetric key.
5. The device of claim 2, wherein the user credential is locally authenticated using a cryptographic function that uses one or more private pre-shared keys and one or more rolling secrets.
6. The device of claim 1, wherein the user credential is combined with an additional authentication element that is combined with the user credential for generating the transformed representation.
7. The device of claim 6, wherein the additional authentication element is requested only for access attempts occurring during a designated duration of time.
8. The device of claim 6, wherein the additional authentication element includes at least one of a declaration in respect of recent travel, wellness checks, temperature readings, or recent location information.
9. The device of claim 6, wherein the additional authentication element is requested during a security level increase or a detected first usage of the user credential.
10. The device of claim 1, wherein the one or more protected resources include one or more access-controlled cabinets that are connected to at least one of the master microprocessor and the secondary microprocessor.
11. A method for controlling access to one or more protected resources, the method comprising:
receiving and decoding, at a secondary microprocessor coupled to a physical access control device, authentication electrical pulses from a user credential reader generated when a user credential interacts with the user credential reader to generate corresponding user identifier data values, the secondary microprocessor configured for transmitting electrical pulse signals to an access control management method that provisions access to the one or more protected resources;
receiving the corresponding user identifier data values at a master microprocessor coupled to an external authentication server and the secondary microprocessor;
transforming the user identifier data values using a cryptographic function to generate a transformed representation for communication to the transformed representation to the external authentication server;
receiving an access provisioning signal from the external authentication server; and
transmitting an instruction signal to the secondary microprocessor to control the secondary microprocessor to provision access to the one or more protected resources;
wherein the secondary microprocessor and the master microprocessor are coupled to one another across a message bus connection and a separate signal path, the signal path enabling uni-directional communication from the secondary microprocessor to the master microprocessor for indicating when the user credential interacts with the user credential reader; and
wherein said user credential is associated with an entity, and wherein receiving said access provisioning signal from said external authentication server is based on whether a mobile communication device associated with said entity is within a threshold distance of said user credential reader when said user credential interacts with said user credential reader.
12. The method of claim 11, wherein the user credential is a local credential that is not provided to or accessible directly by the external authentication server.
13. The method of claim 12, wherein the cryptographic function used to transform the local credential is a private symmetric key.
14. The method of claim 12, wherein the cryptographic function used to transform the local credential is an asymmetric key.
15. The method of claim 13, wherein the user credential is locally authenticated using a cryptographic function that uses one or more private pre-shared keys and one or more rolling secrets.
16. The method of claim 11, wherein the user credential is combined with an additional authentication element that is combined with the user credential for generating the transformed representation.
17. The method of claim 16, wherein the additional authentication element is requested only for access attempts occurring during a designated duration of time.
18. The method of claim 16, wherein the additional authentication element includes at least one of a declaration in respect of recent travel, wellness checks, temperature readings, or recent location information.
19. The method of claim 16, wherein the additional authentication element is requested during a security level increase or a detected first usage of the user credential.
20. A non-transitory computer readable medium, storing machine interpretable instructions which when executed, cause a processor to perform a method for controlling access to one or more protected resources, the method comprising:
receiving and decoding, at a secondary microprocessor coupled to a physical access control device, authentication electrical pulses from a user credential reader generated when a user credential interacts with the user credential reader to generate corresponding user identifier data values, the secondary microprocessor configured for transmitting electrical pulse signals to an access control management method that provisions access to the one or more protected resources;
receiving the corresponding user identifier data values at a master microprocessor coupled to an external authentication server and the secondary microprocessor, transforming the user identifier data values using a cryptographic function to generate a transformed representation for communication to the transformed representation to the external authentication server;
receiving an access provisioning signal from the external authentication server; and
transmitting an instruction signal to the secondary microprocessor to control the secondary microprocessor to provision access to the one or more protected resources;
wherein the secondary microprocessor and the master microprocessor are coupled to one another across a message bus connection and a separate signal path, the signal path enabling uni-directional communication from the secondary microprocessor to the master microprocessor for indicating when the user credential interacts with the user credential reader; and
wherein said user credential is associated with an entity, and wherein receiving said access provisioning signal from said external authentication server is based on whether a mobile communication device associated with said entity is within a threshold distance of said user credential reader when said user credential interacts with said user credential reader.
US18/218,352 2019-09-18 2023-07-05 Access control system Pending US20230353551A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US18/218,352 US20230353551A1 (en) 2019-09-18 2023-07-05 Access control system

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201962901978P 2019-09-18 2019-09-18
US17/026,144 US11736466B2 (en) 2019-09-18 2020-09-18 Access control system
US18/218,352 US20230353551A1 (en) 2019-09-18 2023-07-05 Access control system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US17/026,144 Continuation US11736466B2 (en) 2019-09-18 2020-09-18 Access control system

Publications (1)

Publication Number Publication Date
US20230353551A1 true US20230353551A1 (en) 2023-11-02

Family

ID=74869922

Family Applications (2)

Application Number Title Priority Date Filing Date
US17/026,144 Active 2041-08-18 US11736466B2 (en) 2019-09-18 2020-09-18 Access control system
US18/218,352 Pending US20230353551A1 (en) 2019-09-18 2023-07-05 Access control system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US17/026,144 Active 2041-08-18 US11736466B2 (en) 2019-09-18 2020-09-18 Access control system

Country Status (1)

Country Link
US (2) US11736466B2 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9306743B2 (en) * 2012-08-30 2016-04-05 Texas Instruments Incorporated One-way key fob and vehicle pairing verification, retention, and revocation
CN110428545B (en) * 2019-07-16 2021-07-13 合肥美的智能科技有限公司 Unmanned retail equipment, automatic vending system and settlement method for power-on after power failure
US11736466B2 (en) * 2019-09-18 2023-08-22 Bioconnect Inc. Access control system
KR20210042470A (en) * 2019-10-10 2021-04-20 현대자동차주식회사 Vehicle and terminal device communication with the vehicle and method for controlling the vehicle
US11444950B2 (en) * 2020-04-24 2022-09-13 Vmware, Inc. Automated verification of authenticated users accessing a physical resource
US12166750B2 (en) * 2022-02-08 2024-12-10 Capital One Services, Llc Systems and methods for secure access of storage
CN115032988A (en) * 2022-05-17 2022-09-09 上海景吾酷租科技发展有限公司 Control method and system for cleaning robot to selectively open access control or gate
WO2024196284A1 (en) * 2023-03-19 2024-09-26 Vladimirtsev Arkady Vladimirovich Access control and management system to equipment at an industrial enterprise
US12001910B1 (en) * 2023-04-12 2024-06-04 Oloid Inc. Initialization of touchless identity card emulator

Citations (630)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4571638A (en) * 1983-05-02 1986-02-18 Datacopy Corporation Random-access electronic camera
US4585906A (en) * 1979-11-26 1986-04-29 Vmx, Inc. Electronic audio communication system with user controlled message address
US4750171A (en) * 1986-07-11 1988-06-07 Tadiran Electronics Industries Ltd. Data switching system and method
US5163131A (en) * 1989-09-08 1992-11-10 Auspex Systems, Inc. Parallel i/o network file server architecture
US5197062A (en) * 1991-09-04 1993-03-23 Picklesimer David D Method and system for simultaneous analysis of multiplexed channels
US5299315A (en) * 1992-09-17 1994-03-29 International Business Machines Corp. Personal computer with programmable threshold FIFO registers for data transfer
US5522089A (en) * 1993-05-07 1996-05-28 Cordata, Inc. Personal digital assistant module adapted for initiating telephone communications through DTMF dialing
US5537343A (en) * 1993-09-02 1996-07-16 Elonex Technologies, Inc. Digital assistant system having a host computer with a docking bay and a moveable heat sink for cooling a docked module
US5579489A (en) * 1993-02-10 1996-11-26 Elonex I.P. Holdings, Ltd. Hand-held portable computer having capability for external expansion of an internal bus
US5590382A (en) * 1993-03-15 1996-12-31 Elonex Ip Holdings Ltd. Personal digital assistant module having a multi-portion keyboard with inductive coupling
US5600800A (en) * 1992-06-29 1997-02-04 Elonex I.P. Holdings, Ltd. Personal computer system having a docking bay and a hand-held portable computer adapted to dock in the docking bay by a full-service parallel bus
US5630165A (en) * 1992-12-03 1997-05-13 Advanced Micro Devices, Inc. Servo system controlled by master and second processors through memory being accessed for read and write by processors in separate portions respectively
US5634080A (en) * 1992-06-29 1997-05-27 Elonex Ip Holdings, Ltd. Hand-held portable computer having an electroluminescent flat-panel display with pixel elements at right angles to the plane of the display and an excitation direction parallel to the plane of the display
US5681285A (en) * 1992-10-15 1997-10-28 Baxter International Inc. Infusion pump with an electronically loadable drug library and a user interface for loading the library
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5907616A (en) * 1996-04-29 1999-05-25 Mannesmann Aktiengesellschaft Method for accessing a portion of the data on a microprocessor card
US5961577A (en) * 1996-12-05 1999-10-05 Texas Instruments Incorporated Random binary number generator
US6122403A (en) * 1995-07-27 2000-09-19 Digimarc Corporation Computer system linked by using information in data objects
US20010020254A1 (en) * 1998-06-30 2001-09-06 Blumenau Steven M. Method and apparatus for managing access to storage devices in a storage system with access control
US20010040509A1 (en) * 1998-10-14 2001-11-15 Bud Dungan Apparatus and method for wireless gas monitoring
US6356962B1 (en) * 1998-09-30 2002-03-12 Stmicroelectronics, Inc. Network device and method of controlling flow of data arranged in frames in a data-based network
US20020065946A1 (en) * 2000-10-17 2002-05-30 Shankar Narayan Synchronized computing with internet widgets
US20020106965A1 (en) * 2001-02-02 2002-08-08 Mike Dooley Toy device responsive to visual input
US6496488B1 (en) * 1993-09-30 2002-12-17 Interdigital Technology Corporation Modularly clustered radiotelephone system
US20030023874A1 (en) * 2001-07-16 2003-01-30 Rudy Prokupets System for integrating security and access for facilities and information systems
US6549952B1 (en) * 1997-01-28 2003-04-15 International Business Machines Corporation Passing environment variables from an hypertext protocol server application programming interface
US20030087629A1 (en) * 2001-09-28 2003-05-08 Bluesocket, Inc. Method and system for managing data traffic in wireless networks
US20030101307A1 (en) * 2001-03-15 2003-05-29 Riccardo Gemelli System of distributed microprocessor interfaces toward macro-cell based designs implemented as ASIC or FPGA bread boarding and relative common bus protocol
US20030110131A1 (en) * 2001-12-12 2003-06-12 Secretseal Inc. Method and architecture for providing pervasive security to digital assets
US6587957B1 (en) * 1999-07-30 2003-07-01 Emc Corporation Disk drive controller for controlling data flow therethrough by switching to secondary bus to receive clock pulses when a failure on master bus is detected
US20030135790A1 (en) * 1999-12-22 2003-07-17 Michel Pignol Computer system that tolerates transient errors and method for management in a system of this type
US20030163727A1 (en) * 2002-01-31 2003-08-28 Brocade Communications Systems, Inc. Network security through configuration servers in the fabric environment
US20030163692A1 (en) * 2002-01-31 2003-08-28 Brocade Communications Systems, Inc. Network security and applications to the fabric
US6652188B1 (en) * 2002-04-30 2003-11-25 David T. Albright Fluid coupled control system for irrigation
US6738382B1 (en) * 1999-02-24 2004-05-18 Stsn General Holdings, Inc. Methods and apparatus for providing high speed connectivity to a hotel environment
US20040215759A1 (en) * 2003-01-09 2004-10-28 Yusuke Takahashi Access control system, accessed terminal, access terminal and program for terminal, and access control method
US20050010756A1 (en) * 2003-06-25 2005-01-13 France Telecom Granting authorization to access a resource
US20050015624A1 (en) * 2003-06-09 2005-01-20 Andrew Ginter Event monitoring and management
US20050025179A1 (en) * 2003-07-31 2005-02-03 Cisco Technology, Inc. Distributing and balancing traffic flow in a virtual gateway
US20050044402A1 (en) * 1995-10-24 2005-02-24 Phil Libin Logging access attempts to an area
US20050041472A1 (en) * 2003-05-20 2005-02-24 Nobuaki Matsuoka Semiconductor memory device and portable electronic apparatus
US20050053073A1 (en) * 2003-09-03 2005-03-10 Andiamo Systems, Inc. A Delaware Corporation Switch port analyzers
US20050059469A1 (en) * 2003-09-15 2005-03-17 Igt Draw bingo
US20050101387A1 (en) * 2003-09-15 2005-05-12 Igt Bingo game morphed to display non-bingo outcomes
US20050114722A1 (en) * 2003-11-25 2005-05-26 Matsushita Electric Industrial Co., Ltd. Semiconductor integrated circuit and microprocessor unit switching method
US20050117576A1 (en) * 2000-11-28 2005-06-02 Mci, Inc. Network access system including a programmable access device having distributed service control
US20050193199A1 (en) * 2004-02-13 2005-09-01 Nokia Corporation Accessing protected data on network storage from multiple devices
US20050210179A1 (en) * 2002-12-02 2005-09-22 Walmsley Simon R Integrated circuit having random clock or random delay
US20050212656A1 (en) * 1994-11-15 2005-09-29 Micro Enhanced Technology, Inc. Electronic access control device
US20050227771A1 (en) * 2003-12-16 2005-10-13 Igt Methods and devices for gaming machine configuration
US20050288056A1 (en) * 2004-06-29 2005-12-29 Bajikar Sundeep M System including a wireless wide area network (WWAN) module with an external identity module reader and approach for certifying the WWAN module
US20060025198A1 (en) * 2004-07-30 2006-02-02 Igt Providing non-bingo outcomes for a bingo game
US20060025193A1 (en) * 2004-07-30 2006-02-02 Igt "Buy a peek" gaming methods and devices
US20060025189A1 (en) * 2004-07-30 2006-02-02 Igt Stud bingo
US20060025199A1 (en) * 2004-07-30 2006-02-02 Igt Perrius poker and other bingo game variations
US20060040743A1 (en) * 2004-08-20 2006-02-23 Igt Wide area bonusing systems
US20060046827A1 (en) * 2004-08-24 2006-03-02 Igt Pulltab/bingo controller
US20060046824A1 (en) * 2004-08-25 2006-03-02 Igt Emulation in a secure regulated environment
US20060073887A1 (en) * 2004-10-04 2006-04-06 Igt Wide area progressive jackpot system and methods
US20060080175A1 (en) * 2001-02-02 2006-04-13 International Game Technology Player scoring for customizing a game of chance on a gaming machine
US20060084488A1 (en) * 2000-09-19 2006-04-20 Igt Bonusing digital media
US20060101140A1 (en) * 2004-10-22 2006-05-11 Cisco Technology, Inc. Ethernet extension for the data center
US20060104247A1 (en) * 2004-11-17 2006-05-18 Cisco Technology, Inc. Infrastructure-less bootstrapping: trustless bootstrapping to enable mobility for mobile devices
US20060111168A1 (en) * 2004-10-04 2006-05-25 Igt Class II/Class III hybrid gaming machine, system and methods
US20060112416A1 (en) * 2004-11-08 2006-05-25 Ntt Docomo, Inc. Device management apparatus, device, and device management method
US20060128460A1 (en) * 2001-09-28 2006-06-15 Igt Adventure sequence activities
US20060135241A1 (en) * 2004-12-21 2006-06-22 Igt Method and system for compensating for player choice in a game of chance
US20060136717A1 (en) * 2004-12-20 2006-06-22 Mark Buer System and method for authentication via a proximate device
US20060183538A1 (en) * 2005-02-16 2006-08-17 Igt Flexible determination of progressive awards
US20060184530A1 (en) * 2005-02-11 2006-08-17 Samsung Electronics Co., Ltd. System and method for user access control to content in a network
US20060188128A1 (en) * 1993-11-18 2006-08-24 Rhoads Geoffrey B Method and System for Managing and Controlling Electronic Media
US20060189382A1 (en) * 2001-09-20 2006-08-24 Igt Method and apparatus for registering a mobile device with a gaming machine
US20060206927A1 (en) * 2005-03-08 2006-09-14 Xceedid Systems and methods for dual reader emulation
US20060218252A1 (en) * 2005-03-22 2006-09-28 Cisco Technology, Inc., A Corporation Of California Remote survivable DHCP for a DHCP relay agent
US20060224901A1 (en) * 2005-04-05 2006-10-05 Lowe Peter R System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone
US20060234791A1 (en) * 2005-04-18 2006-10-19 Igt Gaming methods and systems
US20060247035A1 (en) * 2004-08-20 2006-11-02 Igt Wide area loyalty access through independent bonus network
US20060251067A1 (en) * 2004-10-22 2006-11-09 Cisco Technology, Inc., A Corporation Of California Fibre channel over ethernet
US20060281541A1 (en) * 2002-03-12 2006-12-14 Igt. Virtual player tracking and related services
US20070004506A1 (en) * 2000-12-07 2007-01-04 Igt Methods and devices for downloading games of chance
US20070021198A1 (en) * 2001-09-20 2007-01-25 Igt Method and apparatus for registering a mobile device with a gaming machine
US20070026935A1 (en) * 2005-08-01 2007-02-01 Igt Methods and devices for managing gaming networks
US20070026942A1 (en) * 2005-08-01 2007-02-01 Igt Methods and devices for authentication and licensing in a gaming network
US20070036368A1 (en) * 2003-03-11 2007-02-15 Igt Differentiated audio
US20070034691A1 (en) * 2005-08-15 2007-02-15 Davis Michael L Using promiscuous and non-promiscuous data to verify card and reader identity
US20070050777A1 (en) * 2003-06-09 2007-03-01 Hutchinson Thomas W Duration of alerts and scanning of large data stores
US20070049375A1 (en) * 2005-08-29 2007-03-01 Igt Methods and devices for gaming network management
US20070060361A1 (en) * 2005-09-12 2007-03-15 Igt Method and system for instant-on game download
US20070060274A1 (en) * 2000-04-28 2007-03-15 Igt Player loyalty across a gaming enterprise
US20070060363A1 (en) * 2005-09-12 2007-03-15 Igt Distributed game services
US20070067618A1 (en) * 2005-01-18 2007-03-22 Tricipher, Inc. Asymmetric crypto-graphy with rolling key security
US20070094716A1 (en) * 2005-10-26 2007-04-26 Cisco Technology, Inc. Unified network and physical premises access control server
US20070094498A1 (en) * 2005-09-21 2007-04-26 Magnus Nystrom Authentication Method and Apparatus Utilizing Proof-of-Authentication Module
US20070091843A1 (en) * 2005-10-25 2007-04-26 Cisco Technology, Inc. EAP/SIM authentication for Mobile IP to leverage GSM/SIM authentication infrastructure
US20070109983A1 (en) * 2005-11-11 2007-05-17 Computer Associates Think, Inc. Method and System for Managing Access to a Wireless Network
US20070155473A1 (en) * 2005-12-19 2007-07-05 Igt Bingo system with discrete payout categories
US20070155472A1 (en) * 2005-12-19 2007-07-05 Igt Using multiple bingo cards to represent multiple slot paylines and other Class III game options
US20070155471A1 (en) * 2005-12-19 2007-07-05 Igt Bingo gaming machine capable of selecting different bingo pools
US20070161423A1 (en) * 2005-12-19 2007-07-12 Igt Bingo system with downloadable common patterns
US20070171466A1 (en) * 2006-01-24 2007-07-26 Canon Kabushiki Kaisha Image processing system and its management method
US20070173313A1 (en) * 2006-01-24 2007-07-26 Igt Keno simulation of other game outcomes
US20070186106A1 (en) * 2006-01-26 2007-08-09 Ting David M Systems and methods for multi-factor authentication
US20070191070A1 (en) * 1996-12-16 2007-08-16 Rao Raman K Reconfigurable mobile device interfaces supporting authenticated high-quality video, audio, TV and multimedia services
US20070202941A1 (en) * 2006-02-24 2007-08-30 Igt Internet remote game server
US20070208834A1 (en) * 2006-02-14 2007-09-06 Nanamura Roberto N On-demand software service system and method
US20070241182A1 (en) * 2005-12-31 2007-10-18 Broadcom Corporation System and method for binding a smartcard and a smartcard reader
US20070271316A1 (en) * 2006-05-22 2007-11-22 I3Archives, Inc. System and method for backing up medical records
US20070287536A1 (en) * 2006-05-24 2007-12-13 Igt Extension component for authenticating game data
US20080002761A1 (en) * 2006-07-03 2008-01-03 Cisco Technology, Inc. Adapter and method to support long distances on existing fiber
US20080016560A1 (en) * 2004-12-31 2008-01-17 Alcatel Lucent Access Control Method
US20080022355A1 (en) * 2006-06-30 2008-01-24 Hormuzd Khosravi Detection of network environment
US20080019501A1 (en) * 2006-06-28 2008-01-24 Miller William V Iii Method for extending Ethernet over twisted pair conductors and to the telephone network and plug-in apparatus for same employing standard mechanics
US20080034407A1 (en) * 2006-08-01 2008-02-07 Cisco Technology, Inc. Apparatus and methods for supporting 802.1X in daisy chained devices
US20080034217A1 (en) * 2006-07-18 2008-02-07 Bellsouth Intellectual Property Corporation Security For A Personal Communication Device
US20080046674A1 (en) * 2004-06-14 2008-02-21 Eric Bernasconi Interface Device for Debugging and/or Tracing a Computer System Comprising One or Multiple Masters and One or Multiple Slaves Working Together
US20080070652A1 (en) * 2006-09-18 2008-03-20 Igt, Inc. Reduced power consumption wager gaming machine
US20080076572A1 (en) * 2006-09-08 2008-03-27 Igt, Inc. Mobile gaming devices for use in a gaming network having gaming and non-gaming zones
US20080101240A1 (en) * 2006-10-26 2008-05-01 Cisco Technology, Inc. Apparatus and methods for authenticating voice and data devices on the same port
US20080108405A1 (en) * 2006-11-02 2008-05-08 Igt Self-correcting configuration items
US20080113709A1 (en) * 2006-11-09 2008-05-15 Igt Gaming machine with consolidated peripherals
US20080113716A1 (en) * 2006-11-09 2008-05-15 Igt Personalization of video and sound presentation on a gaming machine
US20080113715A1 (en) * 2006-11-09 2008-05-15 Igt Controllable array of networked gaming machine displays
US20080113796A1 (en) * 2006-11-09 2008-05-15 Igt Speaker arrangement and control on a gaming machine
US20080113708A1 (en) * 2006-11-09 2008-05-15 Igt Button panel control for a gaming machine
US20080113741A1 (en) * 2006-11-09 2008-05-15 Igt Gaming machine with adjustable button panel
US20080113821A1 (en) * 2006-11-09 2008-05-15 Igt Gaming machine with vertical door-mounted display
US20080127174A1 (en) * 2006-10-25 2008-05-29 Igt Systems and methods for transmitting and installing software on a gaming machine in a gaming network
US20080163361A1 (en) * 2006-08-09 2008-07-03 Assa Abloy Ab Method and apparatus for making a decision on a card
US20080157927A1 (en) * 2004-12-31 2008-07-03 British Telecommunications Public Limited Company Control of Data Exchange
US20080207307A1 (en) * 2007-02-27 2008-08-28 Igt Methods and architecture for cashless system security
US20080214300A1 (en) * 2000-12-07 2008-09-04 Igt Methods for electronic data security and program authentication
US20080222734A1 (en) * 2000-11-13 2008-09-11 Redlich Ron M Security System with Extraction, Reconstruction and Secure Recovery and Storage of Data
US20080234046A1 (en) * 2007-03-19 2008-09-25 Igt Centralized licensing services
US20080298297A1 (en) * 2007-05-31 2008-12-04 Honeywell International, Inc. Integrated access control system and a method of controlling the same
US20080305854A1 (en) * 2007-06-06 2008-12-11 Igt Database queries within a gaming machine
US20080318655A1 (en) * 2007-06-25 2008-12-25 Igt Method and apparatus for players of wagering games to find friends in a gaming environment
US20090006659A1 (en) * 2001-10-19 2009-01-01 Collins Jack M Advanced mezzanine card for digital network data inspection
US20090055911A1 (en) * 2007-08-24 2009-02-26 Assa Abloy Ab Method for computing the entropic value of a dynamical memory system
US20090055205A1 (en) * 2007-08-23 2009-02-26 Igt Multimedia player tracking infrastructure
US20090070081A1 (en) * 2007-09-06 2009-03-12 Igt Predictive modeling in a gaming system
US20090075715A1 (en) * 2007-09-18 2009-03-19 Igt Multi-card bingo game features
US20090110195A1 (en) * 2007-10-31 2009-04-30 Igt Encrypted data installation
US20090131155A1 (en) * 2007-11-12 2009-05-21 Igt Discounted wagering game devices and methods
US20090149261A1 (en) * 2006-09-18 2009-06-11 Igt Reduced power consumption wager gaming machine
US20090187978A1 (en) * 2008-01-18 2009-07-23 Yahoo! Inc. Security and authentications in peer-to-peer networks
US20090221266A1 (en) * 2005-10-13 2009-09-03 Ntt Docomo, Inc. Mobile terminal, access control management device, and access control management method
US20090264190A1 (en) * 2008-04-21 2009-10-22 Igt Customized player alerts
US20090271504A1 (en) * 2003-06-09 2009-10-29 Andrew Francis Ginter Techniques for agent configuration
US20090276771A1 (en) * 2005-09-15 2009-11-05 3Tera, Inc. Globally Distributed Utility Computing Cloud
US20090298576A1 (en) * 2008-06-02 2009-12-03 Igt Game production and regulatory approval systems
US7631079B1 (en) * 2007-05-21 2009-12-08 Chris Bowman System and method of messaging and obtaining message acknowledgement on a network
US20090323708A1 (en) * 2005-10-06 2009-12-31 Markus Ihle Subscriber and Communication Controller of a communication System and Method for Implementing a Gateway Functionality in a Subscriber of a Communication System
US20090328152A1 (en) * 2008-05-01 2009-12-31 Honeywell International Inc. Method of access control implemented in an ethernet switch
US20100011007A1 (en) * 2008-07-09 2010-01-14 The Boeing Company Secure high performance multi-level security database systems and methods
US20100029373A1 (en) * 2008-08-01 2010-02-04 Igt Gaming machine printing a ticket for promoting play of a bonus event
US20100062838A1 (en) * 2008-09-11 2010-03-11 Igt Flexible determination of gaming and services
US20100061235A1 (en) * 2008-09-05 2010-03-11 Cisco Technology, Inc. Traffic Flow Scheduling Techniques Implemented on Bonded Channels of a Shared Access Cable Network
US20100122094A1 (en) * 2007-03-28 2010-05-13 Shigeyoshi Shima Software ic card system, management server, terminal, service providing server, service providing method, and program
US20100116880A1 (en) * 2008-11-10 2010-05-13 Stollman Jeff Methods and apparatus for transacting with multiple domains based on a credential
US20100138537A1 (en) * 2007-07-31 2010-06-03 Huawei Technologies Co., Ltd. Method, system and terminal for access control in device management
US20100235487A1 (en) * 2009-03-13 2010-09-16 Assa Abloy Ab Use of snmp for management of small footprint devices
US7801040B1 (en) * 2007-10-01 2010-09-21 Cisco Technology, Inc. Node registration technique implemented in access networks
US7801125B2 (en) * 2004-10-22 2010-09-21 Cisco Technology, Inc. Forwarding table reduction and multipath network forwarding
US7817664B2 (en) * 1999-01-08 2010-10-19 Cisco Technology, Inc. Mobile IP accounting
US20100271951A1 (en) * 2008-11-13 2010-10-28 Genesis Networks, Inc. System and method for transmitting video, audio, and data content using a fiber optic network
US20100290472A1 (en) * 2009-05-18 2010-11-18 Cisco Technology, Inc. Achieving about an equal number of active links across chassis in a virtual port-channel environment
US20100304819A1 (en) * 2009-05-27 2010-12-02 Igt Contactless player card with improved security
US20100306530A1 (en) * 2009-06-02 2010-12-02 Johnson Robert A Workgroup key wrapping for community of interest membership authentication
US7853786B1 (en) * 2003-12-17 2010-12-14 Sprint Communications Company L.P. Rules engine architecture and implementation
US7861006B2 (en) * 2004-03-23 2010-12-28 Mcnulty Scott Apparatus, method and system for a tunneling client access point
US7881208B1 (en) * 2001-06-18 2011-02-01 Cisco Technology, Inc. Gateway load balancing protocol
US20110030029A1 (en) * 2009-07-29 2011-02-03 James Woo Remote management and network access control of printing devices within secure networks
US7912997B1 (en) * 2008-03-27 2011-03-22 Xilinx, Inc. Direct memory access engine
US20110105208A1 (en) * 2009-10-30 2011-05-05 Igt Managed On-Line Poker Tournaments
US20110201409A1 (en) * 2010-02-17 2011-08-18 Igt Integrated gaming security monitor and ethernet switch
US20110212761A1 (en) * 2010-02-26 2011-09-01 Igt Gaming machine processor
US20110225625A1 (en) * 2010-03-15 2011-09-15 Broadcom Corporation Dynamic authentication of a user
US20110247058A1 (en) * 2008-12-02 2011-10-06 Friedrich Kisters On-demand personal identification method
US20110252231A1 (en) * 2010-04-08 2011-10-13 Cisco Technology, Inc. Rekey scheme on high speed links
US20110269529A1 (en) * 2010-04-28 2011-11-03 Igt Systems, Apparatus and Methods for Providing Gaming Applications
US20110276911A1 (en) * 2010-05-06 2011-11-10 Lg Electronics Inc. Mobile terminal and method of controlling the same
US20110289106A1 (en) * 2010-05-21 2011-11-24 Rankin Jr Claiborne R Apparatuses, methods and systems for a lead generating hub
US8078739B1 (en) * 2003-12-29 2011-12-13 Cisco Technology, Inc. Solution for handling URL-substitution for data access in a private network architecture
US20120039213A1 (en) * 2009-04-03 2012-02-16 Panasonic Corporation Mobile communication method, mobile communication system, and corresponding apparatus
US20120069131A1 (en) * 2010-05-28 2012-03-22 Abelow Daniel H Reality alternate
US20120131653A1 (en) * 2010-11-19 2012-05-24 Research In Motion Limited System, devices and method for secure authentication
US20120179905A1 (en) * 2011-01-12 2012-07-12 William Rodgers Ackerly Methods and Systems for Distributing Cryptographic Data to Authenticated Recipients
US20120204245A1 (en) * 2011-02-03 2012-08-09 Ting David M T Secure authentication using one-time passwords
US8312540B1 (en) * 2008-06-13 2012-11-13 Juniper Networks, Inc. System for slowing password attacks
US20120287459A1 (en) * 2010-08-18 2012-11-15 Pettis Nathaniel B Location-based print authorization for three-dimensional printers
US20120296476A1 (en) * 2009-10-30 2012-11-22 Richard John Cale Environmental control method and system
US20120315881A1 (en) * 2011-06-13 2012-12-13 Mercury Mobile, Llc Automated notation techniques implemented via mobile devices and/or computer networks
US8333317B2 (en) * 2003-09-30 2012-12-18 Broadcom Corporation System and method for authenticating the proximity of a wireless token to a computing device
US20120321084A1 (en) * 2011-06-17 2012-12-20 Le Saint Eric F Revocation status using other credentials
US20120324242A1 (en) * 2011-06-16 2012-12-20 OneID Inc. Method and system for fully encrypted repository
US20120330769A1 (en) * 2010-03-09 2012-12-27 Kodeid, Inc. Electronic transaction techniques implemented over a computer network
US20130003726A1 (en) * 2008-09-11 2013-01-03 Juniper Networks, Inc. Methods and apparatus related to a flexible data center security architecture
US8370911B1 (en) * 2008-11-20 2013-02-05 George Mallard System for integrating multiple access controls systems
US20130036456A1 (en) * 2010-04-08 2013-02-07 Securekey Technologies Inc. Credential provision and proof system
US20130042011A1 (en) * 2010-04-14 2013-02-14 Panasonic Corporation Communication nodes and network nodes
US20130074171A1 (en) * 2011-09-14 2013-03-21 Jacob Mark Automated login initialization on detection of identifying information
US20130080516A1 (en) * 2010-05-21 2013-03-28 Mark J. Bologh Video delivery expedition apparatuses, methods and systems
US20130090158A1 (en) * 2011-09-30 2013-04-11 Wms Gaming Inc. System and Method for Assessing and Providing Location-Based Benefits
US20130097348A1 (en) * 2011-09-09 2013-04-18 Assa Abloy Ab Method and system for communicating with and programming a secure element
US20130109307A1 (en) * 2011-10-28 2013-05-02 Hans Reisgies System and method for presentation of multiple nfc credentials during a single nfc transaction
US20130138570A1 (en) * 2011-11-29 2013-05-30 Bruce Ross Layered security for age verification and transaction authorization
US20130151417A1 (en) * 2011-12-13 2013-06-13 Manav Gupta Dynamic widget generator apparatuses, methods and systems
US20130159526A1 (en) * 2011-12-20 2013-06-20 Htc Corporation Method of handling access control information and related communication device
US20130160072A1 (en) * 2011-12-16 2013-06-20 Microsoft Corporation Personal space (data) v. corporate space (data)
US8479005B2 (en) * 2004-08-12 2013-07-02 Fujitsu Limited Applet, archive file generation method, archive file generation program, and archive file generation device
US8489872B1 (en) * 2009-10-16 2013-07-16 Vikas Kapoor Apparatuses, methods and systems for a real-time desktop configurer utilizing a user identifier or an initialization request to retrieve a data-structure-tracking syntax-configured string
US20130201986A1 (en) * 2012-02-08 2013-08-08 Cisco Technology, Inc. Stitching multicast trees
US20130207775A1 (en) * 2012-02-15 2013-08-15 Honeywell International Inc. Bootstrapping access models in the absence of training data
US20130212661A1 (en) * 2012-02-13 2013-08-15 XceedlD Corporation Credential management system
US20130238785A1 (en) * 2012-03-06 2013-09-12 Rackspace Us, Inc. System and Method for Metadata Discovery and Metadata-Aware Scheduling
US20130234836A1 (en) * 2008-08-08 2013-09-12 Assa Abloy Ab Directional sensing mechanism and communications authentication
US20130283256A1 (en) * 2013-03-04 2013-10-24 Hello Inc. Telemetry system with remote firmware updates or repair for remote monitoring devices when the monitoring device is not in use by the user
US20130290203A1 (en) * 2012-04-27 2013-10-31 Thomas Purves Social Checkout Widget Generation and Integration Apparatuses, Methods and Systems
US20130346610A1 (en) * 2011-02-24 2013-12-26 Huawei Device Co., Ltd. Device Management Method and Apparatus
US20130346302A1 (en) * 2012-06-20 2013-12-26 Visa International Service Association Remote Portal Bill Payment Platform Apparatuses, Methods and Systems
US8616981B1 (en) * 2012-09-12 2013-12-31 Wms Gaming Inc. Systems, methods, and devices for playing wagering games with location-triggered game features
US8625796B1 (en) * 2012-11-30 2014-01-07 Mourad Ben Ayed Method for facilitating authentication using proximity
US20140053248A1 (en) * 2007-08-24 2014-02-20 Assa Abloy Ab Detecting and responding to an atypical behavior
US20140049360A1 (en) * 2007-08-24 2014-02-20 Assa Abloy Ab Data collection using a credential
US20140052617A1 (en) * 2011-12-13 2014-02-20 Visa International Service Association Payment platform interface widget generation apparatuses, methods and systems
US20140065957A1 (en) * 2012-09-05 2014-03-06 Shishir Gupta Method to implement One Time Readability on NFC Tags
US20140094998A1 (en) * 2006-03-20 2014-04-03 General Electric Company Control system and method for remotely isolating powered units in a vehicle system
US20140098666A1 (en) * 2002-09-17 2014-04-10 Broadcom Corporation Method and system for optimal load balancing in a hybrid wired/wireless network
US20140101679A1 (en) * 2012-10-04 2014-04-10 Verizon Patent And Licensing Inc. Secure transfer of credit card information
US20140143889A1 (en) * 1995-02-13 2014-05-22 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US20140157370A1 (en) * 2012-05-22 2014-06-05 Hasso-Plattner-Institu für Softwaresystemtechnik GmbH Transparent Control of Access Invoking Real-time Analysis of the Query History
US20140164761A1 (en) * 2012-12-09 2014-06-12 International Business Machines Corporation Secure access using location-based encrypted authorization
US20140181955A1 (en) * 2012-12-21 2014-06-26 Certicom Corp. Two factor authentication using near field communications
US8769289B1 (en) * 2012-09-14 2014-07-01 Emc Corporation Authentication of a user accessing a protected resource using multi-channel protocol
US20140201850A1 (en) * 2001-12-12 2014-07-17 Intellectual Ventures I Llc Methods and systems for providing access control to secured data
US8812482B1 (en) * 2009-10-16 2014-08-19 Vikas Kapoor Apparatuses, methods and systems for a data translator
US20140249825A1 (en) * 2013-03-04 2014-09-04 Hello Inc. Remote communication systems and methods for communicating with a building gateway control to control building systems and elements
US20140247140A1 (en) * 2013-03-04 2014-09-04 Hello Inc. Monitoring device with selectable wireless communication
US20140249393A1 (en) * 2013-03-04 2014-09-04 Hello Inc. Wireless monitoring of patient exercise and lifestyle
US20140249852A1 (en) * 2013-03-04 2014-09-04 Hello Inc. Methods using patient monitoring devices with unique patient IDs and a telemetry system
US20140248853A1 (en) * 2013-03-04 2014-09-04 Wind River Systems, Inc. System And Method for Smart Card Based Hardware Root of Trust on Mobile Platforms Using Near Field Communications
US20140247141A1 (en) * 2013-03-04 2014-09-04 Hello Inc. Monitoring device with wireless communication over non-contiguous channels
US20140247153A1 (en) * 2013-03-04 2014-09-04 Hello Inc. Patient monitoring systems and messages that send alerts to patients only when the patient is awake
US20140247152A1 (en) * 2013-03-04 2014-09-04 Hello Inc. Telemetry system with tracking receiver devices
US20140246924A1 (en) * 2013-03-04 2014-09-04 Hello Inc. Telemetry system with wireless power receiver and monitoring devices
US20140247148A1 (en) * 2013-03-04 2014-09-04 Hello Inc. Monitoring device with wireless communication using cdma
US20140282993A1 (en) * 2013-03-14 2014-09-18 Brivo Systems, Inc. System and Method for Physical Access Control
US20140298039A1 (en) * 2006-12-08 2014-10-02 Ashish A. Pandya Programmable intelligent search memory enabled secure dram
US20140298398A1 (en) * 2013-04-02 2014-10-02 Redcloud, Inc. Self-provisioning access control
US20140298483A1 (en) * 2013-04-02 2014-10-02 Canon Kabushiki Kaisha Management device, management system, control method, and storage medium
US20140331286A1 (en) * 2011-07-12 2014-11-06 Assa Abloy Ab Event driven second factor credential authentication
US20140343989A1 (en) * 2013-05-16 2014-11-20 Phantom Technologies, Inc. Implicitly linking access policies using group names
US20140351096A1 (en) * 2013-05-23 2014-11-27 Katherine Laurel Radziwon Techniques for facilitating acquisition and exchange of ebook and other digital content via a computer network
US8910263B1 (en) * 2013-09-17 2014-12-09 Iboss, Inc. Mobile device management profile distribution
US20140373117A1 (en) * 2011-08-31 2014-12-18 Assa Abloy Ab Mobile credential revocation
US8918900B2 (en) * 2004-04-26 2014-12-23 Ivi Holdings Ltd. Smart card for passport, electronic passport, and method, system, and apparatus for authenticating person holding smart card or electronic passport
US20150024710A1 (en) * 2013-07-17 2015-01-22 Honeywell International Inc. Secure remote access using wireless network
US20150032891A1 (en) * 2013-07-24 2015-01-29 Keri Systems, Inc. Access Control System
US8955076B1 (en) * 2012-12-28 2015-02-10 Emc Corporation Controlling access to a protected resource using multiple user devices
US20150081918A1 (en) * 2013-09-17 2015-03-19 Twilio, Inc. System and method for providing communication platform metadata
US20150094075A1 (en) * 2012-03-05 2015-04-02 Sony Corporation Communication control device, communication control method, and base station
US9015476B1 (en) * 2012-12-07 2015-04-21 Emc Corporation Cryptographic device operable in a challenge-response mode
US20150120561A1 (en) * 2011-06-17 2015-04-30 Premier Healthcare Exchange, Inc. Healthcare Transaction Facilitation Platform Apparatuses, Methods and Systems
US20150124822A1 (en) * 2013-11-05 2015-05-07 Cisco Technology, Inc. Managing routing information for tunnel endpoints in overlay networks
US20150124809A1 (en) * 2013-11-05 2015-05-07 Cisco Technology, Inc. Policy enforcement proxy
US9038163B2 (en) * 1998-10-30 2015-05-19 Virnetx, Inc. Systems and methods for connecting network devices over communication network
US9043355B1 (en) * 2009-10-16 2015-05-26 Iqor U.S. Inc. Apparatuses, methods and systems for a journal entry automator
US20150154360A1 (en) * 2013-12-02 2015-06-04 Caremerge, Llc Systems and methods for secure exchanges of information
US9053146B1 (en) * 2009-10-16 2015-06-09 Iqor U.S. Inc. Apparatuses, methods and systems for a web access manager
US9063978B1 (en) * 2009-10-16 2015-06-23 Igor US Inc. Apparatuses, methods and systems for a financial transaction tagger
US20150178548A1 (en) * 2003-05-30 2015-06-25 Apple Inc. Man-machine interface for controlling access to electronic devices
US20150188938A1 (en) * 2013-12-31 2015-07-02 Jeremy Freeze-Skret Scene identification system and methods
US9077758B1 (en) * 2013-03-14 2015-07-07 Mobile System 7 Test mode authorization logging
US20150199684A1 (en) * 2014-01-13 2015-07-16 uQontrol, Inc. Data storage key for secure online transactions
US20150199863A1 (en) * 2014-01-15 2015-07-16 HLT Domestic IP, LLC Systems and methods for use in acquiring credentials from a portable user device in unlocking door lock systems
US20150200925A1 (en) * 2012-07-27 2015-07-16 Assa Abloy Ab Presence-based credential updating
US20150213691A1 (en) * 2014-01-30 2015-07-30 Brooke Dunn Controlled timing of video gaming sound levels
US20150213723A1 (en) * 2014-01-29 2015-07-30 Apollo Education Group, Inc. Resource Resolver
US9100390B1 (en) * 2014-09-05 2015-08-04 Openpeak Inc. Method and system for enrolling and authenticating computing devices for data usage accounting
US9098509B1 (en) * 2009-10-16 2015-08-04 Iqor Holding Inc., Igor U.S. Inc. Apparatuses, methods and systems for a call restrictor
US9106488B1 (en) * 2014-08-23 2015-08-11 Smart Embedded Systems, Inc. Energy efficient highway addressable remote transducer soft modem
US20150228161A1 (en) * 2014-02-13 2015-08-13 Joze Pececnik No-skill, multi-hand blackjack
US20150224387A1 (en) * 2014-02-13 2015-08-13 Young Gi Lee Color war wagering event
US20150228155A1 (en) * 2014-02-13 2015-08-13 Mary Gael Hancock Delayed wager increase in video gaming
US20150235506A1 (en) * 2014-02-19 2015-08-20 Ray Smith Multiple gaming choice in keno by players
US20150235518A1 (en) * 2014-02-20 2015-08-20 Elektroncek D.D. Communal play system with individual station secondary play
US20150248664A1 (en) * 2011-02-16 2015-09-03 Visa International Service Association Snap Mobile Payment Apparatuses, Methods and Systems
US20150248818A1 (en) * 2014-02-28 2015-09-03 He Lin No-commission, asian style baccarat
US20150248820A1 (en) * 2014-02-28 2015-09-03 He Lin No-commission, asian style baccarat
US20150248808A1 (en) * 2014-02-28 2015-09-03 James T. Crawford, III Video wagering system with multi-dimensional cube rotation
US20150254924A1 (en) * 2014-03-05 2015-09-10 Joze Pececnik Mobile, detachable, electronic gaming machine input control
US20150271164A1 (en) * 2014-03-19 2015-09-24 Bluink Ltd Methods and systems for data entry
US20150269369A1 (en) * 2014-03-19 2015-09-24 BluInk Ltd. Methods and systems for data entry
US20150279165A1 (en) * 2014-03-27 2015-10-01 Aron Kock Multiplier side bet in blackjack games
US9154304B1 (en) * 2013-03-14 2015-10-06 Emc Corporation Using a token code to control access to data and applications in a mobile platform
US20150288694A1 (en) * 2014-04-03 2015-10-08 Prote.US Converged Systems Corporation Method and system for secure authentication
US9158604B1 (en) * 2014-05-13 2015-10-13 Qualcomm Incorporated Lightweight data-flow tracker for realtime behavioral analysis using control flow
US20150295763A1 (en) * 2012-11-12 2015-10-15 Zte Corporation Capability open platform, method and gateway for implementing PNP management of terminal device
US20150310751A1 (en) * 2014-04-24 2015-10-29 Indu Tolia Augmented reality assisted education content creation and management
US20150319166A1 (en) * 2014-05-01 2015-11-05 International Business Machines Corporation Dual-party session key derivation
US20150319144A1 (en) * 2014-05-05 2015-11-05 Citrix Systems, Inc. Facilitating Communication Between Mobile Applications
US20150334336A1 (en) * 2014-05-16 2015-11-19 Smart Tlcd Limited Method and system for controlling a display system
US9203665B1 (en) * 2014-08-23 2015-12-01 Smart Embedded Systems, Inc. Resource optimization by implementing multiple instances of a soft modem with a single microcontroller
US20150348361A1 (en) * 2014-06-03 2015-12-03 Wms Gaming Inc. Controlling mechanical outcome indicators of gaming machines
US20150347729A1 (en) * 2014-06-02 2015-12-03 Schlage Lock Company Llc Systems and methods for a credential including multiple access privileges
US20160005248A1 (en) * 2005-04-05 2016-01-07 Assa Abloy Ab First entry notification
US20160013985A1 (en) * 2014-07-10 2016-01-14 Cisco Technology, Inc. On-demand bandwidth provisioning in a network environment
US20160027399A1 (en) * 2013-03-15 2016-01-28 Intel Corporation Mobile computing device technology and systems and methods utilizing the same
US9258234B1 (en) * 2012-12-28 2016-02-09 Juniper Networks, Inc. Dynamically adjusting liveliness detection intervals for periodic network communications
WO2016019474A1 (en) * 2014-08-07 2016-02-11 8857911 Canada Inc. Proximity access control devices, systems and related methods
US20160050160A1 (en) * 2014-08-14 2016-02-18 Cisco Technology, Inc. Sharing resources across multiple devices in online meetings
US20160050213A1 (en) * 2013-04-13 2016-02-18 Digital (Id) Entity Limited System, method, computer program and data signal for the provision of a profile of identification
US9270655B1 (en) * 2011-09-30 2016-02-23 Emc Corporation Configurable one-time authentication tokens with improved resilience to attacks
US20160072904A1 (en) * 2014-09-05 2016-03-10 Openpeak Inc. Method and system for enabling data usage accounting for unreliable transport communication
US20160074744A1 (en) * 2014-09-15 2016-03-17 Barrett Gaming International Side bet for blackjack game
US20160074745A1 (en) * 2014-09-15 2016-03-17 Barrett Gaming International Field side bet for blackjack game
US20160080343A1 (en) * 2013-04-30 2016-03-17 Assa Abloy Ab Method, apparatus, and system for mobile provisioning of nfc credentials
US20160078726A1 (en) * 2014-09-15 2016-03-17 Barrett Gaming International Side bet game with multiplier for blackjack or baccarat
US20160074746A1 (en) * 2014-09-15 2016-03-17 Barrett Gaming International Side bet for blackjack game
US20160087957A1 (en) * 2013-04-26 2016-03-24 Interdigital Patent Holdings, Inc. Multi-factor authentication to achieve required authentication assurance level
US20160093154A1 (en) * 2014-09-26 2016-03-31 Bally Gaming, Inc. Wagering game wearables
US20160099935A1 (en) * 2014-10-01 2016-04-07 VYRTY Corporation Secure access to individual information
US20160104346A1 (en) * 2014-08-06 2016-04-14 Mido Play Inc. Single platform system for multiple jurisdiction lotteries and social media
US9323909B1 (en) * 2012-12-07 2016-04-26 Emc Corporation Sharing a cryptographic device by partitioning challenge-response space
US20160133100A1 (en) * 2014-11-09 2016-05-12 Interblock D.D. Slot machine with secondary game content
US20160148466A1 (en) * 2014-11-23 2016-05-26 Interblock D.D. System and method for direct charitable contributions from gaming apparatus
US20160150411A1 (en) * 2013-07-31 2016-05-26 Kuang-Chi Intelligent Photonic Technology Ltd. Authentication system, and transmit terminal, receive terminal, and right authentication method of same
US20160144270A1 (en) * 2014-11-23 2016-05-26 Daniel L. Sahl Oint count wagering game with playing cards
US20160166915A1 (en) * 2014-12-10 2016-06-16 Dongsun Lee Simplified, rapid play of baccarat-type game
US20160171836A1 (en) * 2014-12-10 2016-06-16 Jeffery Hwang Super blackjack game
US20160166917A1 (en) * 2014-12-10 2016-06-16 Yurong HUANG Three-card wagering system and method
US20160180656A1 (en) * 2014-12-18 2016-06-23 Bally Gaming, Inc. System and method for selective power and secure communications via an electronic gaming machine interface
US20160191494A1 (en) * 2014-12-29 2016-06-30 Vasco Data Security, Inc. Method and apparatus for securing a mobile application
US20160184694A1 (en) * 2014-12-30 2016-06-30 Jeffrey Hwang Wagering game variation based on omaha poker
US20160191236A1 (en) * 2014-12-31 2016-06-30 Sergey Smirnoff Hybrid integration of software development kit with secure execution environment
US20160198501A1 (en) * 2015-01-07 2016-07-07 Cisco Technology, Inc. Wireless roaming using a distributed store
US9396232B1 (en) * 2009-10-16 2016-07-19 Iqor Holdings, Inc. Apparatuses, methods and systems for a rule-integrated virtual punch clock
US20160210209A1 (en) * 2015-01-15 2016-07-21 Cisco Technology, Inc. High availability and failover
US9405799B1 (en) * 2009-10-16 2016-08-02 Iqor Holdings, Inc. Apparatuses, methods and systems for an employee referral facilitator
US9405800B1 (en) * 2004-12-13 2016-08-02 Iqor Holdings Inc. Apparatuses, methods and systems for a universal payment integrator
US20160220177A1 (en) * 2013-06-21 2016-08-04 Hello Inc. Patient monitoring systems and messages that send alerts to patients only when the patient is awake
US20160223218A1 (en) * 2015-01-30 2016-08-04 Schneider Electric It Corporation Automated control and parallel learning hvac apparatuses, methods and systems
US20160220891A1 (en) * 2015-01-31 2016-08-04 Jeffery Hwang Casino table poker wagering event with playing cards
US20160228761A1 (en) * 2015-02-11 2016-08-11 Jeffery J. Hwang Casino table three-card poker wagering event with playing cards
US9420002B1 (en) * 2013-03-14 2016-08-16 Mark McGovern Authorization server access system
US20160240039A1 (en) * 2015-01-21 2016-08-18 Andres Gonzalez-Roa Bingo-type wagering game during play of keno or as a distinct game
US20160239904A1 (en) * 2015-02-16 2016-08-18 Synergy Blue, Llc Enhanced on-demand service functionality implemented in casino gaming networks
US20160239657A1 (en) * 2015-02-13 2016-08-18 Yoti Ltd Digital identity system
US20160241531A1 (en) * 2015-02-13 2016-08-18 Yoti Ltd Confidence values
US20160248748A1 (en) * 2006-08-09 2016-08-25 Assa Abloy Ab Method and apparatus for making a decision on a card
US9454577B1 (en) * 2009-10-16 2016-09-27 Iqor Holdings Inc, Iqor US Inc. Apparatuses, methods and systems for an employee reimbursement evaluator
US9454576B1 (en) * 2009-10-16 2016-09-27 Iqor Holdings Inc., Iqor US Inc. Apparatuses, methods and systems for an employee onboarding automator
US9454526B1 (en) * 2009-10-16 2016-09-27 Iqor Holdings Inc., Iqor US Inc. Apparatuses, methods and systems for a chart of accounts simplifier
US20160294821A1 (en) * 2012-04-01 2016-10-06 Authentify, Inc. Secure authentication in a multi-party system
US20160287975A1 (en) * 2015-04-03 2016-10-06 Robert Barragan Three-card play of baccarat-type game
US20160292970A1 (en) * 2015-04-03 2016-10-06 Robert Barragan Mix and match blackjack game
US20160309485A1 (en) * 2015-04-20 2016-10-20 Samsung Electronics Co., Ltd. Method and device for supporting communication of electronic device
US20160310830A1 (en) * 2015-04-21 2016-10-27 Jeffery Hwang Casino-table wagering event based on texas holdem
US20160335851A1 (en) * 2015-05-12 2016-11-17 Mark A. Litman Side bets for blackjack or baccarat with optional progressive event
US9503442B1 (en) * 2014-06-20 2016-11-22 EMC IP Holding Company LLC Credential-based application programming interface keys
US20160352576A1 (en) * 2015-05-28 2016-12-01 Cisco Technology, Inc. Dynamic attribute based application policy
US20160358408A1 (en) * 2015-06-03 2016-12-08 Mido Play Inc. Methods for multiple legal game providers and multiple jurisdictions with a single platform
US20160359845A1 (en) * 2002-07-26 2016-12-08 Koninklijke Philips N.V. Secure authenticated distance measurement
US9519901B1 (en) * 2015-09-16 2016-12-13 Square, Inc. Biometric payment technology
US20160364949A1 (en) * 2015-06-11 2016-12-15 Big Bet Gaming Llc Wagering event using multiple card rank comparison
US20160371696A1 (en) * 2013-06-30 2016-12-22 Schlage Lock Company Llc Secure mode for electronic access control readers
US20160371683A1 (en) * 2015-06-19 2016-12-22 uQontrol, Inc. Multi-purpose data storage key
US20160381080A1 (en) * 2015-06-29 2016-12-29 Citrix Systems, Inc. Systems and methods for flexible, extensible authentication subsystem that enabled enhance security for applications
US20170011368A1 (en) * 2015-07-07 2017-01-12 Marc Trombino Secure credit card identification system
US20170024967A1 (en) * 2015-07-22 2017-01-26 Mark A. Litman Side bets for blackjack or baccarat with optional progressive event
US20170032613A1 (en) * 2015-07-29 2017-02-02 Mido Play Inc. Single platform system for multiple jurisdiction lotteries
US9564007B2 (en) * 2012-06-04 2017-02-07 Bally Gaming, Inc. Wagering game content based on locations of player check-in
US20170039813A1 (en) * 2015-08-03 2017-02-09 Travis Wade Walters Multi-hand poker wagering game
US20170078454A1 (en) * 2015-09-10 2017-03-16 I'm In It, Llc Methods, devices, and systems for determining a subset for autonomous sharing of digital media
US20170084129A1 (en) * 2015-09-22 2017-03-23 Bally Gaming, Inc. Gaming Systems, Electronic Gaming Machines, And Logic Circuitry For Conducting Skill-Based And Hybrid Gaming
US20170085568A1 (en) * 2015-09-21 2017-03-23 Authentify, Inc. Authenticator centralization and protection
US20170105137A1 (en) * 2015-10-13 2017-04-13 Quanta Computer Inc. Method for reducing load by filtering out broadcast messages
US9659062B1 (en) * 2007-09-28 2017-05-23 Iqor Holdings Inc. Apparatuses, methods and systems for a global benefits purse facilitator
US20170155661A1 (en) * 2015-12-01 2017-06-01 Thi Chau Nguyen-Huu Systems and Methods for Controlling Access to a Computer Device using Traps
US9672281B1 (en) * 2009-10-16 2017-06-06 Iqor US. Inc. Apparatuses, methods and systems for a call searcher
US20170169665A1 (en) * 2015-12-12 2017-06-15 Sarah Anne St. John Bonus event in slot machine play
US20170171690A1 (en) * 2014-07-20 2017-06-15 Lg Electronics Inc. Method for terminal-condition-based d2d communication, and apparatus therefor in wireless communication system
US20170171023A1 (en) * 2015-12-15 2017-06-15 Quanta Computer Inc. Remote zone management of jbod systems
US9686278B1 (en) * 2014-05-07 2017-06-20 Skyport Systems, Inc. Method and system for configuring computing devices
US20170180539A1 (en) * 2015-12-17 2017-06-22 Stanley Security Solutions, Inc. Back Channel Authentication Using Smartphones
US20170187831A1 (en) * 2015-12-29 2017-06-29 Itron, Inc. Universal Abstraction Layer and Management of Resource Devices
US20170186003A1 (en) * 2015-12-28 2017-06-29 Ncr Corporation Secondary authentication of network transactions
US20170195336A1 (en) * 2016-01-05 2017-07-06 Sensormatic Electronics, LLC Method and System for Non-Authoritative Identity and Identity Permissions Broker and Use Thereof
US20170228975A1 (en) * 2014-08-06 2017-08-10 Mido Play Inc. Systems for multiple legal game providers and multiple jurisdictions that provide notifications of lottery ticket status
US20170228964A1 (en) * 2016-02-08 2017-08-10 Andres Gonzalez-Roa Bingo-type wagering game during play of keno or as a distinct game
US20170244645A1 (en) * 2016-02-23 2017-08-24 Cisco Technology, Inc. Method for improving access control for tcp connections while optimizing hardware resources
US20170250006A1 (en) * 2014-08-06 2017-08-31 Mido Play Inc. Single platform system for multiple jurisdiction lotteries
US20170250005A1 (en) * 2014-08-06 2017-08-31 Mido Play Inc. System for multiple jurisdiction lotteries with fraud detection
US20170264649A1 (en) * 2016-03-11 2017-09-14 Dell Products L.P. Employing session level restrictions to limit access to a redirected interface of a composite device
US20170287594A1 (en) * 2014-08-06 2017-10-05 Mido Play Inc. Systems for multiple legal game providers and multiple jurisdictions with a wallet
US20170289636A1 (en) * 2014-07-09 2017-10-05 Lg Electronics Inc. Broadcasting signal transmission device, broadcasting signal reception device, broadcasting signal transmission method, and broadcasting signal reception method
US20170294084A1 (en) * 2015-04-03 2017-10-12 Robert Barragan Three-card play of baccarat-type game
US9805370B1 (en) * 2016-03-31 2017-10-31 Square, Inc. Device fingerprinting at a merchant location
US9813285B1 (en) * 2013-03-14 2017-11-07 Ca, Inc. Enterprise server access system
US20170345236A1 (en) * 2014-12-02 2017-11-30 Carrier Corporation Access control system with automatic mobile credentialing service hand-off
US9858781B1 (en) * 2016-09-09 2018-01-02 Tyco Integrated Security, LLC Architecture for access management
US20180004956A1 (en) * 2016-06-30 2018-01-04 Sequans Communications S.A. Secure Boot and Software Upgrade of A Device
US20180007059A1 (en) * 2014-09-30 2018-01-04 Citrix Systems, Inc. Dynamic Access Control to Network Resources Using Federated Full Domain Logon
US20180027012A1 (en) * 2016-07-20 2018-01-25 Cisco Technology, Inc. Technologies for preventing man-in-the-middle attacks in software defined networks
US20180026872A1 (en) * 2016-07-21 2018-01-25 Cisco Technology, Inc. Detecting and preventing network loops
US20180027020A1 (en) * 2016-07-20 2018-01-25 Cisco Technology, Inc. Automatic port verification and policy application for rogue devices
US20180034822A1 (en) * 2016-07-29 2018-02-01 Citrix Systems, Inc. Computer network providing secure mobile device enrollment features and related methods
US20180034718A1 (en) * 2016-07-28 2018-02-01 Cisco Technology, Inc. Detecting and measuring microbursts in a networking device
US9887975B1 (en) * 2016-08-03 2018-02-06 KryptCo, Inc. Systems and methods for delegated cryptography
US20180040204A1 (en) * 2016-08-04 2018-02-08 Mingcheng Tong 9-8 tie baccarat
US20180053262A1 (en) * 2015-12-22 2018-02-22 Hitachi, Ltd. Resource accommodation device, schedule management device, and resource accommodation system
US20180061184A1 (en) * 2015-03-30 2018-03-01 The Board of Regents of the Nevada System of Higher Education on behalf of the University of Video gaming wager systems and methods
US20180063025A1 (en) * 2016-08-29 2018-03-01 Cisco Technology, Inc. Infrastructure aware adaptive resource allocation
US20180070199A1 (en) * 2016-09-06 2018-03-08 Legic Identsystems Ag Method and devices for transmitting a secured data package to a communication device
US20180077573A1 (en) * 2016-09-07 2018-03-15 T-Mobile Usa, Inc. Untrusted device access to services over a cellular network
US20180089446A1 (en) * 2016-09-29 2018-03-29 Fujitsu Limited Apparatus and system for information processing
US20180091500A1 (en) * 2016-09-23 2018-03-29 Schlage Lock Company Llc Wi-fi enabled credential enrollment reader and credential management system for access control
US20180096752A1 (en) * 2014-08-06 2018-04-05 Mido Play Inc. Systems for multiple legal game providers with digital ledger
US9940793B1 (en) * 2016-12-30 2018-04-10 Stan Deck Reversing multi-card, multi-hand poker event
US20180115897A1 (en) * 2015-05-01 2018-04-26 Assa Abloy Ab Wearable discovery for authentication
US20180146374A1 (en) * 2016-11-16 2018-05-24 Meir Golan System, methods and software for user authentication
US9992316B2 (en) * 2012-06-15 2018-06-05 Muzik Inc. Interactive networked headphones
US20180159839A1 (en) * 2016-12-05 2018-06-07 Nortek Security & Control Llc Mobile credential redemption card
US20180165781A1 (en) * 2015-02-13 2018-06-14 Yoti Holding Limited Digital Identity System
US20180167415A1 (en) * 2016-12-08 2018-06-14 Wanclouds Inc. System and Method for Simplifying Mandatory Access Control Policies
US10003607B1 (en) * 2016-03-24 2018-06-19 EMC IP Holding Company LLC Automated detection of session-based access anomalies in a computer network through processing of session data
US20180176017A1 (en) * 2015-02-13 2018-06-21 Yoti Ltd Digital Identity System
US10009240B2 (en) * 2015-06-05 2018-06-26 Cisco Technology, Inc. System and method of recommending policies that result in particular reputation scores for hosts
US20180182211A1 (en) * 2016-12-22 2018-06-28 Matthew Henry Stream Rapid low total-card blackjack-type game
US10015795B1 (en) * 2017-03-03 2018-07-03 Bank Of America Corporation Mobile cellular device translation into a secure channel identifier for resource management
US20180190079A1 (en) * 2016-12-30 2018-07-05 Phujohn Nguyen Baccarat version of 4-card pai gow
US20180190076A1 (en) * 2017-01-04 2018-07-05 The Board Of Regents Of The Nevada System Of Higher Education On Behalf Of The University Of Ne Systems And Methods For Gaming Using Historical Data
US20180204411A1 (en) * 2017-01-17 2018-07-19 Stanley Deck Dual gaming element system and method
US20180213446A1 (en) * 2015-08-05 2018-07-26 Lg Electronics Inc Communication method using context information of terminal in wireless communication system, and base station
US10034608B1 (en) * 2017-08-14 2018-07-31 Bank Of America Corporation System for receiving transmissions from disparate node and triggering automatic portal action
US20180218573A1 (en) * 2017-01-30 2018-08-02 Troy Pettie Video slot gaming system with positive acting collecaible symbols and collectable event termination symbols
US10042808B1 (en) * 2015-09-16 2018-08-07 Xilinx, Inc. Modeling SPI flash memory commands in hardware
US20180262532A1 (en) * 2015-05-14 2018-09-13 Sequitur Labs, Inc. System and Methods for Facilitating Secure Computing Device Control and Operation
US20180270328A1 (en) * 2017-03-14 2018-09-20 Vmware, Inc. Reserving physical resources based upon a physical identifier
US10089801B1 (en) * 2017-05-15 2018-10-02 Amazon Technologies, Inc. Universal access control device
US20180295561A1 (en) * 2014-11-12 2018-10-11 Nokia Technologies Oy Method and apparatus for cellular access point control
US20180309632A1 (en) * 2017-04-20 2018-10-25 Cisco Technology, Inc. Policy assurance for service chaining
US20180308312A1 (en) * 2017-04-19 2018-10-25 Steven Weiss Electronic gaming machine providing winning outcomes after losing events
US20180314603A1 (en) * 2015-10-29 2018-11-01 Datto, Inc. Apparatuses, methods, and systems for storage and analysis of saas data and non-saas data for businesses and other organizations
US20180324186A1 (en) * 2017-05-05 2018-11-08 Bank Of America Corporation Person-to-person network architecture for secure authorization and approval
US20180322742A1 (en) * 2017-05-03 2018-11-08 Timothy Adams Baccarat pattern wagering system
US20180322204A1 (en) * 2017-05-05 2018-11-08 Bank Of America Corporation System for distributed server data management with multi-user access
US20180322475A1 (en) * 2017-05-05 2018-11-08 Bank Of America Corporation System for multi-factor linkage and management for resource distribution
US20180322257A1 (en) * 2017-05-05 2018-11-08 Bank Of America Corporation System for identification of treatment and resource deployment based on treatment interaction
US20180322474A1 (en) * 2017-05-05 2018-11-08 Bank Of America Corporation Machine initiated user status update system
US20180332079A1 (en) * 2015-07-31 2018-11-15 Palo Alto Networks, Inc. Efficient and secure user credential store for credentials enforcement using a firewall
US10135833B2 (en) * 2015-05-29 2018-11-20 Schlage Lock Company Llc Credential driving an automatic lock update
US20180341411A1 (en) * 2017-05-24 2018-11-29 Cisco Technology, Inc. Intelligent layout of composite data structures in tiered storage
US20180351788A1 (en) * 2017-05-31 2018-12-06 Cisco Technology, Inc. Fault localization in large-scale network policy deployment
US20180351782A1 (en) * 2017-05-31 2018-12-06 Cisco Technology, Inc. Associating network policy objects with specific faults corresponding to fault localizations in large-scale network deployment
US20180351821A1 (en) * 2017-05-31 2018-12-06 Cisco Technology, Inc. Generating a network-wide logical model for network policy analysis
US20180351820A1 (en) * 2017-05-31 2018-12-06 Cisco Technology, Inc. Generating device-level logical models for a network
US20180351791A1 (en) * 2017-05-31 2018-12-06 Cisco Technology, Inc. Network policy analysis for networks
US20180367429A1 (en) * 2017-06-19 2018-12-20 Cisco Technology, Inc. Static endpoint validation
US20180367388A1 (en) * 2017-06-19 2018-12-20 Cisco Technology, Inc. Multiprotocol border gateway protocol routing validation
US20180367412A1 (en) * 2017-06-16 2018-12-20 Cisco Technology, Inc. Topology explorer
US20180367399A1 (en) * 2017-06-19 2018-12-20 Cisco Technology, Inc. Validating endpoint configurations between nodes
US20180367400A1 (en) * 2017-06-19 2018-12-20 Cisco Technology, Inc. Validation of a virtual port channel (vpc) endpoint in the network fabric
US20180367396A1 (en) * 2017-06-19 2018-12-20 Cisco Technology, Inc. Identifying mismatches between a logical model and node implementation
US20180367449A1 (en) * 2017-06-19 2018-12-20 Cisco Technology, Inc. Validation of routing information in a network fabric
US20180367526A1 (en) * 2017-06-19 2018-12-20 Citrix Systems, Inc. Systems and methods for dynamic flexible authentication in a cloud service
US20180367397A1 (en) * 2017-06-19 2018-12-20 Cisco Technology, Inc. Endpoint bridge domain subnet validation
US20180367371A1 (en) * 2017-06-16 2018-12-20 Cisco Technology, Inc. Handling controller and node failure scenarios during data collection
US20180367541A1 (en) * 2017-06-16 2018-12-20 Cisco Technology, Inc. System and method for migrating to and maintaining a white-list network security model
US20180367398A1 (en) * 2017-06-19 2018-12-20 Cisco Technology, Inc. Validating tunnel endpoint addresses in a network fabric
US10163107B1 (en) * 2016-03-31 2018-12-25 Square, Inc. Technical fallback infrastructure
US20180374315A1 (en) * 2017-06-27 2018-12-27 Harold Moret, JR. Domino wagering event
US20180369688A1 (en) * 2017-06-27 2018-12-27 Harold Moret, JR. Domino wagering event
US20180374314A1 (en) * 2017-06-27 2018-12-27 Harold Moret, JR. Domino wagering event
US10182056B1 (en) * 2014-07-31 2019-01-15 Open Text Corporation Descendent case role alias
US10180962B1 (en) * 2007-09-28 2019-01-15 Iqor Us Inc. Apparatuses, methods and systems for a real-time phone configurer
US10185628B1 (en) * 2017-12-07 2019-01-22 Cisco Technology, Inc. System and method for prioritization of data file backups
US20190028478A1 (en) * 2017-07-21 2019-01-24 Schlage Lock Company Llc Leveraging flexible distributed tokens in an access control system
US20190028482A1 (en) * 2017-07-21 2019-01-24 Cisco Technology, Inc. Wireless network steering
US20190026992A1 (en) * 2017-07-18 2019-01-24 Troy Pettie Video poker event with aggregating outcome increaser
US20190028958A1 (en) * 2017-06-23 2019-01-24 Schlage Lock Company Llc Predictive rate limiting for reliable bluetooth low energy connections
US20190028552A1 (en) * 2017-07-20 2019-01-24 Cisco Technology, Inc. Managing a distributed network of function execution environments
US20190025873A1 (en) * 2017-07-21 2019-01-24 Schlage Lock Company Llc Secure real-time clock update in an access control system
US20190036946A1 (en) * 2015-09-17 2019-01-31 Tower-Sec Ltd Systems and methods for detection of malicious activity in vehicle data communication networks
US20190066452A1 (en) * 2017-08-23 2019-02-28 Kathleen Nylund Jackson Custom deck card game
US20190081852A1 (en) * 2017-09-12 2019-03-14 Cisco Technology, Inc. Event clustering for a network assurance platform
US20190081850A1 (en) * 2017-09-13 2019-03-14 Cisco Technology, Inc. Network assurance event aggregator
US20190081871A1 (en) * 2017-09-12 2019-03-14 Cisco Technology, Inc. Anomaly detection and reporting in a network assurance appliance
US20190108696A1 (en) * 2017-10-11 2019-04-11 Jean Hugues Wendling Electronic credential reader
US20190114337A1 (en) * 2017-10-18 2019-04-18 Cisco Technology, Inc. Efficient trickle updates in large databases using persistent memory
US20190123985A1 (en) * 2017-10-25 2019-04-25 Cisco Technology, Inc. Federated network and application data analytics platform
US20190123983A1 (en) * 2017-10-25 2019-04-25 Cisco Technology, Inc. Data integration and user application framework
US20190130702A1 (en) * 2017-10-28 2019-05-02 Garry Hamud Player versus dealer poker variant with free money provided to a player for continuing game play
US20190130703A1 (en) * 2017-10-29 2019-05-02 Garry Hamud Player versus dealer poker variant with free money provided to a player for continuing game play
US20190130128A1 (en) * 2017-10-26 2019-05-02 VYRTY Corporation Encryption scheme for making secure patient data available to authorized parties
US20190132346A1 (en) * 2015-12-15 2019-05-02 Flying Cloud Technologies, Inc. Distributed Data Surveillance in a Community Capture Environment
US20190132326A1 (en) * 2017-10-27 2019-05-02 Cleverdome, Inc. Software Defined Network for Creating a Trusted Network System
US20190147070A1 (en) * 2017-11-13 2019-05-16 Cisco Technology, Inc. Using persistent memory to enable restartability of bulk load transactions in cloud databases
US20190163283A1 (en) * 2017-11-30 2019-05-30 Komodo OpenLab Inc. Configurable device switching mechanism that enables seamless interactions with multiple devices
US20190164387A1 (en) * 2017-11-30 2019-05-30 Vinko Dobrosevic No-bust, player versus player blackjack gaming event
US20190171434A1 (en) * 2008-01-07 2019-06-06 Xceedid Corporation Systems and methods for programming a credential reader
US20190173736A1 (en) * 2017-12-05 2019-06-06 Cisco Technology, Inc. Cross-domain assurance
US20190173847A1 (en) * 2017-12-05 2019-06-06 RELAY WIRELESS NETWORK, LLC d/b/a AERWAVE Adaptive and dynamic network provisioning
US20190180535A1 (en) * 2017-12-11 2019-06-13 Carrier Corporation On-demand credential for service personnel
US20190180566A1 (en) * 2017-12-08 2019-06-13 Jeffery Hwang Novel pai gow card game with asymmetric card distribution
US10325087B1 (en) * 2018-07-09 2019-06-18 Capital One Services, Llc Systems and methods for authenticating a user at a public terminal
US20190197828A1 (en) * 2017-02-16 2019-06-27 Troy Pettie Skill-assistance in skill-based wagering
US20190197146A1 (en) * 2017-12-21 2019-06-27 Cisco Technology, Inc. Using persistent memory to enable consistent data for batch processing and streaming processing
US20190207976A1 (en) * 2018-01-04 2019-07-04 Cisco Technology, Inc. Network intrusion counter-intelligence
US10348695B1 (en) * 2016-05-26 2019-07-09 VYRTY Corporation Secure access to individual information
US20190221078A1 (en) * 2018-01-12 2019-07-18 Garry Hamud Advanced strategy blackjack playing card game
US20190229995A1 (en) * 2018-01-25 2019-07-25 Cisco Technology, Inc. Automatic configuration discovery based on traffic flow data
US20190230035A1 (en) * 2018-01-25 2019-07-25 Cisco Technology, Inc. Network flow stitching using middle box flow stitching
US20190230041A1 (en) * 2018-01-25 2019-07-25 Cisco Technology, Inc. Discovery of middleboxes using traffic flow stitching
US20190230127A1 (en) * 2018-01-25 2019-07-25 Cisco Technology, Inc. Secure publishing for policy updates
US10366571B1 (en) * 2018-03-06 2019-07-30 Rachel Wurmbrand Electronic gaming machine with projectile which eliminates symbols
US10366378B1 (en) * 2016-06-30 2019-07-30 Square, Inc. Processing transactions in offline mode
US20190236911A1 (en) * 2018-01-29 2019-08-01 Ray Smith Specialty decks and blackjack game using the specialty decks
US20190238517A1 (en) * 2018-01-31 2019-08-01 The Toronto-Dominion Bank Real-Time Authentication and Authorization Based on Dynamically Generated Cryptographic Data
US20190247050A1 (en) * 2006-11-21 2019-08-15 David S. Goldsmith Integrated system for the infixion and retrieval of implants
US20190251768A1 (en) * 2016-09-14 2019-08-15 Carrier Corporation Energy efficient secure wi-fi credentialing for access control systems
US20190253255A1 (en) * 2017-09-25 2019-08-15 Amazon Technologies, Inc. Time-bound secure access
US20190259246A1 (en) * 2018-02-21 2019-08-22 Mark Yoseloff Multi-game video poker wagering having replay feature
US20190266847A1 (en) * 2018-01-31 2019-08-29 Tonya Moore Word-based video gaming system in reel format
US20190268329A1 (en) * 2018-02-27 2019-08-29 Bank Of America Corporation Preventing Unauthorized Access to Secure Information Systems Using Multi-Factor, Hardware Based and/or Advanced Biometric Authentication
US20190297114A1 (en) * 2018-03-20 2019-09-26 Cisco Technology, Inc. On-demand security policy provisioning
US20190311055A1 (en) * 2018-04-04 2019-10-10 Schlage Lock Company Llc Access control with multiple security ecosystems
US20190317481A1 (en) * 2016-07-12 2019-10-17 Siemens Aktiengesellschaft Firewall System and Method for Establishing Secured Communications Connections to an Industrial Automation System
US20190327135A1 (en) * 2006-09-25 2019-10-24 Remot3.It, Inc. System, method and computer program product for accessing a device on a network
US20190325673A1 (en) * 2016-12-25 2019-10-24 Avi Roitman Bardack Distributed one-time-use entry code generation for physical access control method of operation and mobile systems
US20190349354A1 (en) * 2018-05-09 2019-11-14 Schlage Lock Company Llc Utilizing caveats for wireless credential access
US20190347895A1 (en) * 2018-05-11 2019-11-14 Jeffrey Raske Nine-card poker wagering array
US20190354700A1 (en) * 2018-05-17 2019-11-21 Carrier Corporation Query-Aware Privacy for Access Control Data Analytics
US20190362571A1 (en) * 2018-05-25 2019-11-28 The Well Effect Company Access Control, Resource and Priority Management System and Method
US20190372977A1 (en) * 2018-05-30 2019-12-05 Indoor Robotics Ltd. System and a method for granting ad-hoc access and controlling privileges to physical devices
US20190379635A1 (en) * 2018-06-06 2019-12-12 Cisco Technology, Inc. Service chains for inter-cloud traffic
US20190374213A1 (en) * 2018-06-08 2019-12-12 David S. Goldsmith Ductus sede-entry and prosthetic disorder response systems
US20190386973A1 (en) * 2018-06-19 2019-12-19 Cisco Technology, Inc. Distributed authentication and authorization for rapid scaling of containerized services
US20190386977A1 (en) * 2018-06-19 2019-12-19 Netgear, Inc. Secure transfer of registered network access devices
US20200007583A1 (en) * 2018-06-27 2020-01-02 Cisco Technology, Inc. Assurance of security rules in a network
US10540484B2 (en) * 2001-01-17 2020-01-21 Contentguard Holdings, Inc. Networked services licensing system and method
US20200059492A1 (en) * 2018-08-20 2020-02-20 Cisco Technology, Inc. Elastic policy scaling in multi-cloud fabrics
US20200092272A1 (en) * 2016-12-12 2020-03-19 Trusona, Inc. Methods and systems for network-enabled account creation using optical detection
US20200090441A1 (en) * 2017-01-09 2020-03-19 Carrier Corporation Access control system with local mobile key distribution
US10601872B1 (en) * 2016-01-20 2020-03-24 F5 Networks, Inc. Methods for enhancing enforcement of compliance policies based on security violations and devices thereof
US10623446B1 (en) * 2019-09-09 2020-04-14 Cyberark Software Ltd. Multi-factor authentication for applications and virtual instance identities
US10623401B1 (en) * 2017-01-06 2020-04-14 Allstate Insurance Company User authentication based on telematics information
US10636019B1 (en) * 2016-03-31 2020-04-28 Square, Inc. Interactive gratuity platform
US20200137052A1 (en) * 2018-10-31 2020-04-30 EMC IP Holding Company LLC User Authentication Using Biometric Representation of One-Time Passcodes
US20200134158A1 (en) * 2018-10-31 2020-04-30 EMC IP Holding Company LLC User Authentication Using Scene Composed of Selected Objects
US20200134146A1 (en) * 2018-10-31 2020-04-30 EMC IP Holding Company LLC Biometric Authentication Using Selected Manipulation of Biometric Samples
US10650139B2 (en) * 2017-06-12 2020-05-12 Daniel Maurice Lerner Securing temporal digital communications via authentication and validation for wireless user and access devices with securitized containers
US20200162467A1 (en) * 2018-11-20 2020-05-21 Cisco Technology, Inc. System and method for migrating existing access control list policies to intent based policies and vice versa
US20200235990A1 (en) * 2019-01-18 2020-07-23 Cisco Technology, Inc. Seamless multi-cloud routing and policy interconnectivity
US20200244668A1 (en) * 2019-01-28 2020-07-30 Cisco Technology, Inc. Authenticating Client Devices to an Enterprise Network
US20200244670A1 (en) * 2019-01-30 2020-07-30 EMC IP Holding Company LLC Location Assurance Using Location Indicators Modified by Shared Secrets
US20200242222A1 (en) * 2019-01-28 2020-07-30 EMC IP Holding Company LLC User Authentication by Endpoint Device Using Local Policy Engine and Endpoint Data
US20200241917A1 (en) * 2017-10-13 2020-07-30 Huawei Technologies Co., Ltd. Resource management method and terminal device
US20200242220A1 (en) * 2019-01-28 2020-07-30 EMC IP Holding Company LLC Authentication using user device microphone inputs
US20200242225A1 (en) * 2019-01-30 2020-07-30 EMC IP Holding Company LLC Biometric Authentication Using Molecular Snapshots
US20200242227A1 (en) * 2019-01-28 2020-07-30 EMC IP Holding Company LLC Temporary partial authentication value provisioning for offline authentication
US20200252385A1 (en) * 2019-02-01 2020-08-06 EMC IP Holding Company LLC Authentication Based on Shared Secret Updates
US20200252392A1 (en) * 2019-02-01 2020-08-06 EMC IP Holding Company LLC Authentication Based on Shared Secret Seed Updates for One-Time Passcode Generation
US20200252212A1 (en) * 2019-02-01 2020-08-06 EMC IP Holding Company LLC Client-Driven Shared Secret Updates for Client Authentication
US20200250042A1 (en) * 2019-01-31 2020-08-06 Rubrik, Inc. Distributed streaming database restores
US20200250044A1 (en) * 2019-01-31 2020-08-06 Rubrik, Inc. Distributed streaming parallel database restores
US20200250340A1 (en) * 2019-02-04 2020-08-06 Hewlett Packard Enterprise Development Lp Security rules compliance for personally identifiable information
US10748206B1 (en) * 2014-02-21 2020-08-18 Painted Dog, Inc. Dynamic media-product searching platform apparatuses, methods and systems
US10764752B1 (en) * 2018-08-21 2020-09-01 HYPR Corp. Secure mobile initiated authentication
US20200287962A1 (en) * 2019-03-05 2020-09-10 Cisco Technology, Inc. Load balancing in a distributed system
US20200304508A1 (en) * 2019-03-18 2020-09-24 Samsung Electronics Co., Ltd. Method and device for providing authentication in network-based media processing (nbmp) system
US20200314650A1 (en) * 2019-03-29 2020-10-01 Citrix Systems, Inc. Controlling access to protected resource using a heat map
US10819750B1 (en) * 2018-04-27 2020-10-27 Amazon Technologies, Inc. Multi-tenant authentication and permissions framework
US20200344238A1 (en) * 2017-11-03 2020-10-29 Sensormatic Electronics, LLC Methods and System for Controlling Access to Enterprise Resources Based on Tracking
US20200351661A1 (en) * 2016-04-11 2020-11-05 Carrier Corporation Capturing personal user intent when interacting with multiple access controls
US20200382519A1 (en) * 2019-05-29 2020-12-03 Cisco Technology, Inc. Enforcing data sovereignty policies in a cloud environment
US20200382505A1 (en) * 2019-05-30 2020-12-03 Bank Of America Corporation Controlling Access to Secure Information Resources Using Rotational Datasets and Dynamically Configurable Data Containers
US20200382506A1 (en) * 2019-05-30 2020-12-03 Bank Of America Corporation Controlling Access to Secure Information Resources Using Rotational Datasets and Dynamically Configurable Data Containers
US20200382381A1 (en) * 2019-05-29 2020-12-03 Cisco Technology, Inc. Design tool for network performance design and configuration
US20200380147A1 (en) * 2019-05-30 2020-12-03 Bank Of America Corporation Controlling Access to Secure Information Resources Using Rotational Datasets and Dynamically Configurable Data Containers
US20210044976A1 (en) * 2018-08-21 2021-02-11 HYPR Corp. Secure mobile initiated authentications to web-services
US10942666B2 (en) * 2017-10-13 2021-03-09 Cisco Technology, Inc. Using network device replication in distributed storage clusters
US20210075707A1 (en) * 2019-09-06 2021-03-11 Cisco Technology, Inc. Technologies for dynamically generating network topology-based and location-based insights
US20210084021A1 (en) * 2019-09-18 2021-03-18 Bioconnect Inc. Access control system
US20210092019A1 (en) * 2019-09-20 2021-03-25 Sonatus, Inc. System, method, and apparatus to extra vehicle communications control
US20210112607A1 (en) * 2018-06-13 2021-04-15 Nec Corporation Communication system and communication method
US20210110027A1 (en) * 2018-06-25 2021-04-15 Giesecke+Devrient Mobile Security Gmbh Smart card as a security token
US20210150835A1 (en) * 2018-04-18 2021-05-20 Carrier Corporation Visualization and management of access levels for access control based al hierarchy
US11023878B1 (en) * 2015-06-05 2021-06-01 Square, Inc. Apparatuses, methods, and systems for transmitting payment proxy information
US20210194888A1 (en) * 2019-12-23 2021-06-24 Citrix Systems, Inc. Restricted access to sensitive content
US11050763B1 (en) * 2016-10-21 2021-06-29 United Services Automobile Association (Usaa) Distributed ledger for network security management
US11062014B1 (en) * 2018-01-30 2021-07-13 Rsa Security Llc Dynamic challenge question-based authentication
US20210286861A1 (en) * 2020-03-12 2021-09-16 Haworth, Inc. User Experience Container Level Identity Federation and Content Security
US20210289103A1 (en) * 2020-03-10 2021-09-16 Canon Kabushiki Kaisha Scanner, scanner control method, and storage medium
US20210295434A1 (en) * 2020-03-19 2021-09-23 Vault Data, LLC Platform for research, analysis, and communications compliance of investment data
US20210304537A1 (en) * 2020-03-28 2021-09-30 Zkteco Usa Unattended touchless health-check screening systems incorporating biometrics and thermographic technologies
US20210328999A1 (en) * 2019-03-29 2021-10-21 Citrix Systems, Inc. Techniques involving a security heat map
US20210409396A1 (en) * 2018-11-21 2021-12-30 Nec Corporation Information provision system, information provision method, and storage medium
US20210409378A1 (en) * 2020-06-30 2021-12-30 Microsoft Technology Licensing, Llc Method and System of Securing VPN Communications
US20210409432A1 (en) * 2020-06-26 2021-12-30 AppCensus, Inc. Automatic identification of applications that circumvent permissions and/or obfuscate data flows
US20220052792A1 (en) * 2019-04-29 2022-02-17 Lg Electronics Inc. Method and device for determining harq feedback option in nr v2x
US20220101309A1 (en) * 2020-09-30 2022-03-31 Snap Inc. Cross-platform data management and integration
US20220132471A1 (en) * 2019-07-10 2022-04-28 Lg Electronics Inc. Method and device for determining feedback resource in nr v2x
US20220182239A1 (en) * 2020-12-07 2022-06-09 Accenture Global Solutions Limited Privacy preserving user authentication
US20220210185A1 (en) * 2019-03-14 2022-06-30 Orange Mitigating computer attacks
US11386107B1 (en) * 2015-02-13 2022-07-12 Omnicom Media Group Holdings Inc. Variable data source dynamic and automatic ingestion and auditing platform apparatuses, methods and systems
US20220255931A1 (en) * 2020-10-08 2022-08-11 HYPR Corp. Domain unrestricted mobile initiated login
US20220300296A1 (en) * 2021-03-22 2022-09-22 Rakuten Mobile, Inc. Method and apparatus for constructing a network service
US20220312422A1 (en) * 2019-08-29 2022-09-29 Lg Electronics Inc. Method and device for selecting resource related to sidelink in nr v2x
US11481509B1 (en) * 2018-07-10 2022-10-25 United Services Automobile Association (Usaa) Device management and security through a distributed ledger system
US20220377725A1 (en) * 2019-10-17 2022-11-24 Lg Electronics Inc. Method and apparatus for performing sensing for sidelink communication in nr v2x
US20220393781A1 (en) * 2019-12-01 2022-12-08 Lg Electronics Inc. Method and apparatus for estimating channel in wireless communication system
US20220400484A1 (en) * 2019-11-08 2022-12-15 Lg Electronics Inc. Method and device for selecting sl transmission resource in nr v2x
US20220408457A1 (en) * 2019-10-31 2022-12-22 Lg Electronics Inc. Method and device for performing sl communication on basis of resource allocation mode 1 in nr v2x
US11563695B2 (en) * 2016-08-29 2023-01-24 Cisco Technology, Inc. Queue protection using a shared global memory reserve
US20230067168A1 (en) * 2021-08-24 2023-03-02 Rakuten Mobile, Inc. Network service construction graphical user interface, apparatus and method
US11632366B1 (en) * 2018-09-28 2023-04-18 F5, Inc. Multi-device authentication
US20230142830A1 (en) * 2021-01-15 2023-05-11 Lg Electronics Inc. Method for transmitting/receiving uplink control channel, and device therefor
US20230153449A1 (en) * 2021-11-12 2023-05-18 Microsoft Technology Licensing, Llc System and method of providing granual access control
US20230180266A1 (en) * 2021-05-04 2023-06-08 Lg Electronics Inc. Method and apparatus for determining non-preferred resource in wireless communication system
US20230199804A1 (en) * 2021-04-14 2023-06-22 Lg Electronics Inc. Method and device for transmitting or receiving physical sidelink feedback channel in wireless communication system
US20230208850A1 (en) * 2020-04-23 2023-06-29 Petal Cloud Technology Co., Ltd. Resource Obtaining Method and System, Server, and Storage Medium
US20230214941A1 (en) * 2011-06-24 2023-07-06 Monster Worldwide, Inc. Social Match Platform Apparatuses, Methods and Systems
US20230297714A1 (en) * 2022-03-16 2023-09-21 Snap Inc. Protected data use in third party software applications
US20230354329A1 (en) * 2022-04-28 2023-11-02 Lg Electronics Inc. Method of transmitting and receiving downlink control channel and apparatus therefor
US20230393890A1 (en) * 2022-06-03 2023-12-07 Snap Inc. Auto-recovery for ar wearable devices
US20240056233A1 (en) * 2019-11-06 2024-02-15 Lg Electronics Inc. Method for user equipment to transmit and receive feedback information in wireless communication system supporting sidelink and device for same
US20240078295A1 (en) * 2022-09-02 2024-03-07 Double Zero Systems, devices and methods for authentication and authorization to provide adaptive access to resources
US20240265399A1 (en) * 2011-06-17 2024-08-08 Zelis Payments, Llc Healthcare Transaction Facilitation Platform Apparatuses, Methods and Systems
US20240388443A1 (en) * 2023-05-19 2024-11-21 Shore Labs Zbigniew Zemla Browser-based authentication scheme

Family Cites Families (77)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4531023A (en) * 1982-08-13 1985-07-23 Hlf Corporation Computer security system for a time shared computer accessed over telephone lines
US5983266A (en) * 1997-03-26 1999-11-09 Unisys Corporation Control method for message communication in network supporting software emulated modules and hardware implemented modules
WO2001060012A2 (en) * 2000-02-11 2001-08-16 Verimatrix, Inc. Web based human services conferencing network
US7426750B2 (en) * 2000-02-18 2008-09-16 Verimatrix, Inc. Network-based content distribution system
US20010056508A1 (en) * 2000-05-12 2001-12-27 Kenneth Arneson Event notification system and method
US8719562B2 (en) * 2002-10-25 2014-05-06 William M. Randle Secure service network and user gateway
US7181507B1 (en) * 2000-07-18 2007-02-20 Harrow Products Llc Internet based access point management system
US7168092B2 (en) * 2000-08-31 2007-01-23 Sun Microsystems, Inc. Configuring processing units
FR2841714B1 (en) * 2002-06-26 2005-03-04 Viaccess Sa PROTOCOL FOR ADAPTATION OF THE DEGREE OF INTERACTIVITY BETWEEN COMPUTER EQUIPMENT INTERLOCUTORS SUBJECT TO INTERACTIVE DIALOGUE
US7689229B2 (en) * 2003-06-26 2010-03-30 Myleaderboard, Inc. System and method for dissemination of information in a limited-access environment
US20070245369A1 (en) * 2003-09-05 2007-10-18 Remote Security Systems, Llc Lockbox management system and method
US20050162253A1 (en) * 2004-01-22 2005-07-28 Wilson W. N. Authentication and access control via wireless communication
US20050188425A1 (en) * 2004-02-19 2005-08-25 Douglas Horn Electronic information lockout system
US11159484B2 (en) * 2004-03-16 2021-10-26 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US20060187836A1 (en) * 2005-02-18 2006-08-24 Stefan Frey Communication device and method of prioritizing transference of time-critical data
KR101446944B1 (en) * 2005-07-25 2014-10-07 코닌클리케 필립스 엔.브이. Method of controlled access to content
US8347354B2 (en) * 2007-03-16 2013-01-01 Research In Motion Limited Restricting access to hardware for which a driver is installed on a computer
US8316190B2 (en) * 2007-04-06 2012-11-20 Waratek Pty. Ltd. Computer architecture and method of operation for multi-computer distributed processing having redundant array of independent systems with replicated memory and code striping
US20180198788A1 (en) * 2007-06-12 2018-07-12 Icontrol Networks, Inc. Security system integrated with social media platform
US11423756B2 (en) * 2007-06-12 2022-08-23 Icontrol Networks, Inc. Communication protocols in integrated systems
US10423309B2 (en) * 2007-06-12 2019-09-24 Icontrol Networks, Inc. Device integration framework
US11218878B2 (en) * 2007-06-12 2022-01-04 Icontrol Networks, Inc. Communication protocols in integrated systems
US10223903B2 (en) * 2010-09-28 2019-03-05 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US8667518B2 (en) * 2007-11-02 2014-03-04 Quadriga Worldwide Limited System and method for providing controlled access
US20090164776A1 (en) * 2007-12-21 2009-06-25 Nokia Corporation Revocation status checking for digital rights managment
US20090191846A1 (en) * 2008-01-25 2009-07-30 Guangming Shi Biometric smart card for mobile devices
US20160164923A1 (en) * 2008-08-25 2016-06-09 Paul J. Dawes Method for data routing in networks
JP5379232B2 (en) * 2008-09-23 2013-12-25 テレフオンアクチーボラゲット エル エム エリクソン(パブル) Terminal access control in UTRAN femto system
US8437742B2 (en) * 2009-10-16 2013-05-07 At&T Intellectual Property I, L.P. Systems and methods for providing location-based application authentication using a location token service
US20130144657A1 (en) * 2011-11-16 2013-06-06 Flextronics Ap, Llc Insurance tracking
US8838982B2 (en) * 2011-09-21 2014-09-16 Visa International Service Association Systems and methods to secure user identification
WO2013124635A1 (en) * 2012-02-24 2013-08-29 Sony Corporation Mobile communication using reconfigurable user identification module
US9521031B2 (en) * 2012-02-27 2016-12-13 Boingo Wireless, Inc. Internet access control using depth parameters
US20140344909A1 (en) * 2013-01-22 2014-11-20 Reza Raji Password entry through temporally-unique tap sequence
EP3343961A1 (en) * 2013-02-08 2018-07-04 Schlage Lock Company LLC Control system and method
FR3003974A1 (en) * 2013-03-28 2014-10-03 France Telecom METHOD AND DEVICE FOR TRANSMITTING A FILE CONTAINING CONTROLLED ACCESS MULTIMEDIA CONTENT
US10129248B2 (en) * 2013-07-08 2018-11-13 Assa Abloy Ab One-time-password generated on reader device using key read from personal security device
WO2015008112A1 (en) * 2013-07-18 2015-01-22 Freescale Semiconductor, Inc. System on chip and method therefor
US9177166B2 (en) * 2013-08-21 2015-11-03 Systel Business Equipment Co., Inc. System and method for authentication
US9369443B1 (en) * 2013-09-18 2016-06-14 NetSuite Inc. Field level data protection for cloud services using asymmetric cryptography
WO2015140643A2 (en) * 2014-03-19 2015-09-24 Busarov Alexander Rfid based anti-counterfeiting, distribution enhancement and customer analysis system
CN104486083A (en) * 2014-12-19 2015-04-01 小米科技有限责任公司 Supervisory video processing method and device
JP2016218575A (en) * 2015-05-15 2016-12-22 富士ゼロックス株式会社 Data transmission system, data transmission device, and program
US9723026B2 (en) * 2015-07-09 2017-08-01 Cisco Technology, Inc. Managing network resource access using session context
US20170228531A1 (en) * 2015-09-14 2017-08-10 Reza Raji Password entry through temporally-unique tap sequence
US10992678B1 (en) * 2015-09-15 2021-04-27 Sean Gilman Internet access control and reporting system and method
US9847020B2 (en) * 2015-10-10 2017-12-19 Videx, Inc. Visible light communication of an access credential in an access control system
FR3048529B1 (en) * 2016-03-01 2018-03-23 Ingenico Group METHOD FOR MODULATING ACCESS TO A RESOURCE, DEVICE AND PROGRAM THEREOF
US9888007B2 (en) * 2016-05-13 2018-02-06 Idm Global, Inc. Systems and methods to authenticate users and/or control access made by users on a computer network using identity services
US20170364944A1 (en) * 2016-06-15 2017-12-21 Visa International Service Association Systems and methods for efficient processing of large scale propagation of resources among accounts
US10462145B2 (en) * 2016-07-15 2019-10-29 The Directv Group, Inc. Method and apparatus for controlling access to custom browser functionality
US20180091504A1 (en) * 2016-09-29 2018-03-29 Adi Sagi System and method for protecting data items
US10498712B2 (en) * 2016-11-10 2019-12-03 Ernest Brickell Balancing public and personal security needs
US10180682B2 (en) * 2017-02-23 2019-01-15 The Directv Group, Inc. Shared control of vehicle functions
EP3382478B1 (en) * 2017-03-31 2021-09-08 Siemens Aktiengesellschaft Method, computer program product and control unit for controlling access to it system based networks, in particular automation networks, management networks or control networks comprising embedded systems or distributed systems
US10965668B2 (en) * 2017-04-27 2021-03-30 Acuant, Inc. Systems and methods to authenticate users and/or control access made by users based on enhanced digital identity verification
US10652245B2 (en) * 2017-05-04 2020-05-12 Ernest Brickell External accessibility for network devices
US10348706B2 (en) * 2017-05-04 2019-07-09 Ernest Brickell Assuring external accessibility for devices on a network
US11297050B2 (en) * 2017-07-17 2022-04-05 Thirdwayv, Inc. Secure communication for medical devices
US11563567B2 (en) * 2017-09-27 2023-01-24 Visa International Service Association Secure shared key establishment for peer to peer communications
US10783240B2 (en) * 2017-09-29 2020-09-22 Stmicroelectronics, Inc. Secure environment in a non-secure microcontroller
US11276022B2 (en) * 2017-10-20 2022-03-15 Acuant, Inc. Enhanced system and method for identity evaluation using a global score value
US10997577B2 (en) * 2017-11-06 2021-05-04 Paypal, Inc. Systems and methods generating electronic tokens in response to user location
US11146546B2 (en) * 2018-01-16 2021-10-12 Acuant, Inc. Identity proofing and portability on blockchain
US10917408B2 (en) * 2018-03-15 2021-02-09 Fuji Xerox Co., Ltd. Secure document management through verification of security states of information processing apparatuses in peer-to-peer transmission of encrypted documents
US10938863B2 (en) * 2018-03-15 2021-03-02 Fuji Xerox Co., Ltd. Secure document management through verification of security states of information processing apparatuses in the peer-to-peer transmission of encrypted documents
US11288385B2 (en) * 2018-04-13 2022-03-29 Sophos Limited Chain of custody for enterprise documents
US20190325677A1 (en) * 2018-04-24 2019-10-24 Carrier Corporation Home security system with automatic authorization functionality
US10965449B2 (en) * 2018-05-31 2021-03-30 Microsoft Technology Licensing, Llc Autonomous secrets management for a key distribution service
US10884939B2 (en) * 2018-06-11 2021-01-05 Amazon Technologies, Inc. Cache pre-fetching using cyclic buffer
US11297078B2 (en) * 2019-02-28 2022-04-05 Paypal, Inc. Cybersecurity detection and mitigation system using machine learning and advanced data correlation
US11489716B2 (en) * 2019-08-20 2022-11-01 Citrix Systems, Inc. Desktop virtualization with a dedicated cellular network connection for client devices
US10685351B1 (en) * 2019-09-19 2020-06-16 Capital One Services, Llc Designation of a trusted user
US20210158468A1 (en) * 2019-11-22 2021-05-27 Edmond Gregoryona Method for Identifying Individuals Who Are Connected Through a Digital Platform.
US20210281977A1 (en) * 2020-03-05 2021-09-09 Xerox Corporation Indoor positioning system for a mobile electronic device
EP4024242B1 (en) * 2020-12-29 2023-08-30 HID Global GmbH Reader device and method of configuring the same
US20220222637A1 (en) * 2021-01-08 2022-07-14 The Toronto-Dominion Bank Split transfers with completion after processing failure

Patent Citations (632)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4585906A (en) * 1979-11-26 1986-04-29 Vmx, Inc. Electronic audio communication system with user controlled message address
US4571638A (en) * 1983-05-02 1986-02-18 Datacopy Corporation Random-access electronic camera
US4750171A (en) * 1986-07-11 1988-06-07 Tadiran Electronics Industries Ltd. Data switching system and method
US5163131A (en) * 1989-09-08 1992-11-10 Auspex Systems, Inc. Parallel i/o network file server architecture
US5197062A (en) * 1991-09-04 1993-03-23 Picklesimer David D Method and system for simultaneous analysis of multiplexed channels
US5634080A (en) * 1992-06-29 1997-05-27 Elonex Ip Holdings, Ltd. Hand-held portable computer having an electroluminescent flat-panel display with pixel elements at right angles to the plane of the display and an excitation direction parallel to the plane of the display
US5600800A (en) * 1992-06-29 1997-02-04 Elonex I.P. Holdings, Ltd. Personal computer system having a docking bay and a hand-held portable computer adapted to dock in the docking bay by a full-service parallel bus
US5299315A (en) * 1992-09-17 1994-03-29 International Business Machines Corp. Personal computer with programmable threshold FIFO registers for data transfer
US5681285A (en) * 1992-10-15 1997-10-28 Baxter International Inc. Infusion pump with an electronically loadable drug library and a user interface for loading the library
US5630165A (en) * 1992-12-03 1997-05-13 Advanced Micro Devices, Inc. Servo system controlled by master and second processors through memory being accessed for read and write by processors in separate portions respectively
US5579489A (en) * 1993-02-10 1996-11-26 Elonex I.P. Holdings, Ltd. Hand-held portable computer having capability for external expansion of an internal bus
US5590382A (en) * 1993-03-15 1996-12-31 Elonex Ip Holdings Ltd. Personal digital assistant module having a multi-portion keyboard with inductive coupling
US5522089A (en) * 1993-05-07 1996-05-28 Cordata, Inc. Personal digital assistant module adapted for initiating telephone communications through DTMF dialing
US5537343A (en) * 1993-09-02 1996-07-16 Elonex Technologies, Inc. Digital assistant system having a host computer with a docking bay and a moveable heat sink for cooling a docked module
US6496488B1 (en) * 1993-09-30 2002-12-17 Interdigital Technology Corporation Modularly clustered radiotelephone system
US20060188128A1 (en) * 1993-11-18 2006-08-24 Rhoads Geoffrey B Method and System for Managing and Controlling Electronic Media
US20050212656A1 (en) * 1994-11-15 2005-09-29 Micro Enhanced Technology, Inc. Electronic access control device
US20140143889A1 (en) * 1995-02-13 2014-05-22 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US6122403A (en) * 1995-07-27 2000-09-19 Digimarc Corporation Computer system linked by using information in data objects
US20050044402A1 (en) * 1995-10-24 2005-02-24 Phil Libin Logging access attempts to an area
US5907616A (en) * 1996-04-29 1999-05-25 Mannesmann Aktiengesellschaft Method for accessing a portion of the data on a microprocessor card
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5961577A (en) * 1996-12-05 1999-10-05 Texas Instruments Incorporated Random binary number generator
US20070191070A1 (en) * 1996-12-16 2007-08-16 Rao Raman K Reconfigurable mobile device interfaces supporting authenticated high-quality video, audio, TV and multimedia services
US6549952B1 (en) * 1997-01-28 2003-04-15 International Business Machines Corporation Passing environment variables from an hypertext protocol server application programming interface
US20010020254A1 (en) * 1998-06-30 2001-09-06 Blumenau Steven M. Method and apparatus for managing access to storage devices in a storage system with access control
US6356962B1 (en) * 1998-09-30 2002-03-12 Stmicroelectronics, Inc. Network device and method of controlling flow of data arranged in frames in a data-based network
US20010040509A1 (en) * 1998-10-14 2001-11-15 Bud Dungan Apparatus and method for wireless gas monitoring
US9038163B2 (en) * 1998-10-30 2015-05-19 Virnetx, Inc. Systems and methods for connecting network devices over communication network
US7817664B2 (en) * 1999-01-08 2010-10-19 Cisco Technology, Inc. Mobile IP accounting
US6738382B1 (en) * 1999-02-24 2004-05-18 Stsn General Holdings, Inc. Methods and apparatus for providing high speed connectivity to a hotel environment
US6587957B1 (en) * 1999-07-30 2003-07-01 Emc Corporation Disk drive controller for controlling data flow therethrough by switching to secondary bus to receive clock pulses when a failure on master bus is detected
US20030135790A1 (en) * 1999-12-22 2003-07-17 Michel Pignol Computer system that tolerates transient errors and method for management in a system of this type
US20070060274A1 (en) * 2000-04-28 2007-03-15 Igt Player loyalty across a gaming enterprise
US20060084488A1 (en) * 2000-09-19 2006-04-20 Igt Bonusing digital media
US20020065946A1 (en) * 2000-10-17 2002-05-30 Shankar Narayan Synchronized computing with internet widgets
US20080222734A1 (en) * 2000-11-13 2008-09-11 Redlich Ron M Security System with Extraction, Reconstruction and Secure Recovery and Storage of Data
US20050117576A1 (en) * 2000-11-28 2005-06-02 Mci, Inc. Network access system including a programmable access device having distributed service control
US20080214300A1 (en) * 2000-12-07 2008-09-04 Igt Methods for electronic data security and program authentication
US20070004506A1 (en) * 2000-12-07 2007-01-04 Igt Methods and devices for downloading games of chance
US10540484B2 (en) * 2001-01-17 2020-01-21 Contentguard Holdings, Inc. Networked services licensing system and method
US20020106965A1 (en) * 2001-02-02 2002-08-08 Mike Dooley Toy device responsive to visual input
US20060080175A1 (en) * 2001-02-02 2006-04-13 International Game Technology Player scoring for customizing a game of chance on a gaming machine
US20030101307A1 (en) * 2001-03-15 2003-05-29 Riccardo Gemelli System of distributed microprocessor interfaces toward macro-cell based designs implemented as ASIC or FPGA bread boarding and relative common bus protocol
US7881208B1 (en) * 2001-06-18 2011-02-01 Cisco Technology, Inc. Gateway load balancing protocol
US20030023874A1 (en) * 2001-07-16 2003-01-30 Rudy Prokupets System for integrating security and access for facilities and information systems
US20070021198A1 (en) * 2001-09-20 2007-01-25 Igt Method and apparatus for registering a mobile device with a gaming machine
US20060189382A1 (en) * 2001-09-20 2006-08-24 Igt Method and apparatus for registering a mobile device with a gaming machine
US20060128460A1 (en) * 2001-09-28 2006-06-15 Igt Adventure sequence activities
US20030087629A1 (en) * 2001-09-28 2003-05-08 Bluesocket, Inc. Method and system for managing data traffic in wireless networks
US20090006659A1 (en) * 2001-10-19 2009-01-01 Collins Jack M Advanced mezzanine card for digital network data inspection
US20140201850A1 (en) * 2001-12-12 2014-07-17 Intellectual Ventures I Llc Methods and systems for providing access control to secured data
US20030110131A1 (en) * 2001-12-12 2003-06-12 Secretseal Inc. Method and architecture for providing pervasive security to digital assets
US20030163727A1 (en) * 2002-01-31 2003-08-28 Brocade Communications Systems, Inc. Network security through configuration servers in the fabric environment
US20030163692A1 (en) * 2002-01-31 2003-08-28 Brocade Communications Systems, Inc. Network security and applications to the fabric
US20060281541A1 (en) * 2002-03-12 2006-12-14 Igt. Virtual player tracking and related services
US6652188B1 (en) * 2002-04-30 2003-11-25 David T. Albright Fluid coupled control system for irrigation
US20160359845A1 (en) * 2002-07-26 2016-12-08 Koninklijke Philips N.V. Secure authenticated distance measurement
US20140098666A1 (en) * 2002-09-17 2014-04-10 Broadcom Corporation Method and system for optimal load balancing in a hybrid wired/wireless network
US20050210179A1 (en) * 2002-12-02 2005-09-22 Walmsley Simon R Integrated circuit having random clock or random delay
US20040215759A1 (en) * 2003-01-09 2004-10-28 Yusuke Takahashi Access control system, accessed terminal, access terminal and program for terminal, and access control method
US20070036368A1 (en) * 2003-03-11 2007-02-15 Igt Differentiated audio
US20050041472A1 (en) * 2003-05-20 2005-02-24 Nobuaki Matsuoka Semiconductor memory device and portable electronic apparatus
US20150178548A1 (en) * 2003-05-30 2015-06-25 Apple Inc. Man-machine interface for controlling access to electronic devices
US20070050777A1 (en) * 2003-06-09 2007-03-01 Hutchinson Thomas W Duration of alerts and scanning of large data stores
US20050015624A1 (en) * 2003-06-09 2005-01-20 Andrew Ginter Event monitoring and management
US20090271504A1 (en) * 2003-06-09 2009-10-29 Andrew Francis Ginter Techniques for agent configuration
US20050010756A1 (en) * 2003-06-25 2005-01-13 France Telecom Granting authorization to access a resource
US20050025179A1 (en) * 2003-07-31 2005-02-03 Cisco Technology, Inc. Distributing and balancing traffic flow in a virtual gateway
US20050053073A1 (en) * 2003-09-03 2005-03-10 Andiamo Systems, Inc. A Delaware Corporation Switch port analyzers
US20050059469A1 (en) * 2003-09-15 2005-03-17 Igt Draw bingo
US20050101387A1 (en) * 2003-09-15 2005-05-12 Igt Bingo game morphed to display non-bingo outcomes
US8333317B2 (en) * 2003-09-30 2012-12-18 Broadcom Corporation System and method for authenticating the proximity of a wireless token to a computing device
US20050114722A1 (en) * 2003-11-25 2005-05-26 Matsushita Electric Industrial Co., Ltd. Semiconductor integrated circuit and microprocessor unit switching method
US20050227771A1 (en) * 2003-12-16 2005-10-13 Igt Methods and devices for gaming machine configuration
US7853786B1 (en) * 2003-12-17 2010-12-14 Sprint Communications Company L.P. Rules engine architecture and implementation
US8078739B1 (en) * 2003-12-29 2011-12-13 Cisco Technology, Inc. Solution for handling URL-substitution for data access in a private network architecture
US20050193199A1 (en) * 2004-02-13 2005-09-01 Nokia Corporation Accessing protected data on network storage from multiple devices
US7861006B2 (en) * 2004-03-23 2010-12-28 Mcnulty Scott Apparatus, method and system for a tunneling client access point
US8918900B2 (en) * 2004-04-26 2014-12-23 Ivi Holdings Ltd. Smart card for passport, electronic passport, and method, system, and apparatus for authenticating person holding smart card or electronic passport
US20080046674A1 (en) * 2004-06-14 2008-02-21 Eric Bernasconi Interface Device for Debugging and/or Tracing a Computer System Comprising One or Multiple Masters and One or Multiple Slaves Working Together
US20050288056A1 (en) * 2004-06-29 2005-12-29 Bajikar Sundeep M System including a wireless wide area network (WWAN) module with an external identity module reader and approach for certifying the WWAN module
US20060025199A1 (en) * 2004-07-30 2006-02-02 Igt Perrius poker and other bingo game variations
US20060025198A1 (en) * 2004-07-30 2006-02-02 Igt Providing non-bingo outcomes for a bingo game
US20060025193A1 (en) * 2004-07-30 2006-02-02 Igt "Buy a peek" gaming methods and devices
US20060025189A1 (en) * 2004-07-30 2006-02-02 Igt Stud bingo
US8479005B2 (en) * 2004-08-12 2013-07-02 Fujitsu Limited Applet, archive file generation method, archive file generation program, and archive file generation device
US20060040743A1 (en) * 2004-08-20 2006-02-23 Igt Wide area bonusing systems
US20060247035A1 (en) * 2004-08-20 2006-11-02 Igt Wide area loyalty access through independent bonus network
US20060046827A1 (en) * 2004-08-24 2006-03-02 Igt Pulltab/bingo controller
US20060046824A1 (en) * 2004-08-25 2006-03-02 Igt Emulation in a secure regulated environment
US20060073887A1 (en) * 2004-10-04 2006-04-06 Igt Wide area progressive jackpot system and methods
US20060111168A1 (en) * 2004-10-04 2006-05-25 Igt Class II/Class III hybrid gaming machine, system and methods
US7801125B2 (en) * 2004-10-22 2010-09-21 Cisco Technology, Inc. Forwarding table reduction and multipath network forwarding
US20060251067A1 (en) * 2004-10-22 2006-11-09 Cisco Technology, Inc., A Corporation Of California Fibre channel over ethernet
US20060101140A1 (en) * 2004-10-22 2006-05-11 Cisco Technology, Inc. Ethernet extension for the data center
US20060112416A1 (en) * 2004-11-08 2006-05-25 Ntt Docomo, Inc. Device management apparatus, device, and device management method
US20060104247A1 (en) * 2004-11-17 2006-05-18 Cisco Technology, Inc. Infrastructure-less bootstrapping: trustless bootstrapping to enable mobility for mobile devices
US9405800B1 (en) * 2004-12-13 2016-08-02 Iqor Holdings Inc. Apparatuses, methods and systems for a universal payment integrator
US20060136717A1 (en) * 2004-12-20 2006-06-22 Mark Buer System and method for authentication via a proximate device
US20060135241A1 (en) * 2004-12-21 2006-06-22 Igt Method and system for compensating for player choice in a game of chance
US20080157927A1 (en) * 2004-12-31 2008-07-03 British Telecommunications Public Limited Company Control of Data Exchange
US20080016560A1 (en) * 2004-12-31 2008-01-17 Alcatel Lucent Access Control Method
US20070067618A1 (en) * 2005-01-18 2007-03-22 Tricipher, Inc. Asymmetric crypto-graphy with rolling key security
US20060184530A1 (en) * 2005-02-11 2006-08-17 Samsung Electronics Co., Ltd. System and method for user access control to content in a network
US20060183538A1 (en) * 2005-02-16 2006-08-17 Igt Flexible determination of progressive awards
US20060206927A1 (en) * 2005-03-08 2006-09-14 Xceedid Systems and methods for dual reader emulation
US20060218252A1 (en) * 2005-03-22 2006-09-28 Cisco Technology, Inc., A Corporation Of California Remote survivable DHCP for a DHCP relay agent
US20160005248A1 (en) * 2005-04-05 2016-01-07 Assa Abloy Ab First entry notification
US20060224901A1 (en) * 2005-04-05 2006-10-05 Lowe Peter R System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone
US20060234791A1 (en) * 2005-04-18 2006-10-19 Igt Gaming methods and systems
US20070026935A1 (en) * 2005-08-01 2007-02-01 Igt Methods and devices for managing gaming networks
US20070026942A1 (en) * 2005-08-01 2007-02-01 Igt Methods and devices for authentication and licensing in a gaming network
US20070034691A1 (en) * 2005-08-15 2007-02-15 Davis Michael L Using promiscuous and non-promiscuous data to verify card and reader identity
US20070049375A1 (en) * 2005-08-29 2007-03-01 Igt Methods and devices for gaming network management
US20070060361A1 (en) * 2005-09-12 2007-03-15 Igt Method and system for instant-on game download
US20070060363A1 (en) * 2005-09-12 2007-03-15 Igt Distributed game services
US20140040343A1 (en) * 2005-09-15 2014-02-06 Peter Nickolov Globally Distributed Utility Computing Cloud
US20090276771A1 (en) * 2005-09-15 2009-11-05 3Tera, Inc. Globally Distributed Utility Computing Cloud
US20070094498A1 (en) * 2005-09-21 2007-04-26 Magnus Nystrom Authentication Method and Apparatus Utilizing Proof-of-Authentication Module
US20090323708A1 (en) * 2005-10-06 2009-12-31 Markus Ihle Subscriber and Communication Controller of a communication System and Method for Implementing a Gateway Functionality in a Subscriber of a Communication System
US20090221266A1 (en) * 2005-10-13 2009-09-03 Ntt Docomo, Inc. Mobile terminal, access control management device, and access control management method
US20070091843A1 (en) * 2005-10-25 2007-04-26 Cisco Technology, Inc. EAP/SIM authentication for Mobile IP to leverage GSM/SIM authentication infrastructure
US20070094716A1 (en) * 2005-10-26 2007-04-26 Cisco Technology, Inc. Unified network and physical premises access control server
US20070109983A1 (en) * 2005-11-11 2007-05-17 Computer Associates Think, Inc. Method and System for Managing Access to a Wireless Network
US20070155473A1 (en) * 2005-12-19 2007-07-05 Igt Bingo system with discrete payout categories
US20070155472A1 (en) * 2005-12-19 2007-07-05 Igt Using multiple bingo cards to represent multiple slot paylines and other Class III game options
US20070161423A1 (en) * 2005-12-19 2007-07-12 Igt Bingo system with downloadable common patterns
US20070155471A1 (en) * 2005-12-19 2007-07-05 Igt Bingo gaming machine capable of selecting different bingo pools
US20070241182A1 (en) * 2005-12-31 2007-10-18 Broadcom Corporation System and method for binding a smartcard and a smartcard reader
US20070173313A1 (en) * 2006-01-24 2007-07-26 Igt Keno simulation of other game outcomes
US20070171466A1 (en) * 2006-01-24 2007-07-26 Canon Kabushiki Kaisha Image processing system and its management method
US20070186106A1 (en) * 2006-01-26 2007-08-09 Ting David M Systems and methods for multi-factor authentication
US20070208834A1 (en) * 2006-02-14 2007-09-06 Nanamura Roberto N On-demand software service system and method
US20070202941A1 (en) * 2006-02-24 2007-08-30 Igt Internet remote game server
US20140094998A1 (en) * 2006-03-20 2014-04-03 General Electric Company Control system and method for remotely isolating powered units in a vehicle system
US20070271316A1 (en) * 2006-05-22 2007-11-22 I3Archives, Inc. System and method for backing up medical records
US20070287536A1 (en) * 2006-05-24 2007-12-13 Igt Extension component for authenticating game data
US20080019501A1 (en) * 2006-06-28 2008-01-24 Miller William V Iii Method for extending Ethernet over twisted pair conductors and to the telephone network and plug-in apparatus for same employing standard mechanics
US20080022355A1 (en) * 2006-06-30 2008-01-24 Hormuzd Khosravi Detection of network environment
US20080002761A1 (en) * 2006-07-03 2008-01-03 Cisco Technology, Inc. Adapter and method to support long distances on existing fiber
US20080034217A1 (en) * 2006-07-18 2008-02-07 Bellsouth Intellectual Property Corporation Security For A Personal Communication Device
US20080034407A1 (en) * 2006-08-01 2008-02-07 Cisco Technology, Inc. Apparatus and methods for supporting 802.1X in daisy chained devices
US20080163361A1 (en) * 2006-08-09 2008-07-03 Assa Abloy Ab Method and apparatus for making a decision on a card
US20160248748A1 (en) * 2006-08-09 2016-08-25 Assa Abloy Ab Method and apparatus for making a decision on a card
US20080076572A1 (en) * 2006-09-08 2008-03-27 Igt, Inc. Mobile gaming devices for use in a gaming network having gaming and non-gaming zones
US20090149261A1 (en) * 2006-09-18 2009-06-11 Igt Reduced power consumption wager gaming machine
US20080070652A1 (en) * 2006-09-18 2008-03-20 Igt, Inc. Reduced power consumption wager gaming machine
US20190327135A1 (en) * 2006-09-25 2019-10-24 Remot3.It, Inc. System, method and computer program product for accessing a device on a network
US20080127174A1 (en) * 2006-10-25 2008-05-29 Igt Systems and methods for transmitting and installing software on a gaming machine in a gaming network
US20080101240A1 (en) * 2006-10-26 2008-05-01 Cisco Technology, Inc. Apparatus and methods for authenticating voice and data devices on the same port
US20080108405A1 (en) * 2006-11-02 2008-05-08 Igt Self-correcting configuration items
US20080113708A1 (en) * 2006-11-09 2008-05-15 Igt Button panel control for a gaming machine
US20080113709A1 (en) * 2006-11-09 2008-05-15 Igt Gaming machine with consolidated peripherals
US20080113716A1 (en) * 2006-11-09 2008-05-15 Igt Personalization of video and sound presentation on a gaming machine
US20080113821A1 (en) * 2006-11-09 2008-05-15 Igt Gaming machine with vertical door-mounted display
US20080113715A1 (en) * 2006-11-09 2008-05-15 Igt Controllable array of networked gaming machine displays
US20080113741A1 (en) * 2006-11-09 2008-05-15 Igt Gaming machine with adjustable button panel
US20080113796A1 (en) * 2006-11-09 2008-05-15 Igt Speaker arrangement and control on a gaming machine
US20190247050A1 (en) * 2006-11-21 2019-08-15 David S. Goldsmith Integrated system for the infixion and retrieval of implants
US20140298039A1 (en) * 2006-12-08 2014-10-02 Ashish A. Pandya Programmable intelligent search memory enabled secure dram
US20080207307A1 (en) * 2007-02-27 2008-08-28 Igt Methods and architecture for cashless system security
US20080234046A1 (en) * 2007-03-19 2008-09-25 Igt Centralized licensing services
US20100122094A1 (en) * 2007-03-28 2010-05-13 Shigeyoshi Shima Software ic card system, management server, terminal, service providing server, service providing method, and program
US7631079B1 (en) * 2007-05-21 2009-12-08 Chris Bowman System and method of messaging and obtaining message acknowledgement on a network
US20080298297A1 (en) * 2007-05-31 2008-12-04 Honeywell International, Inc. Integrated access control system and a method of controlling the same
US20080305854A1 (en) * 2007-06-06 2008-12-11 Igt Database queries within a gaming machine
US20080318655A1 (en) * 2007-06-25 2008-12-25 Igt Method and apparatus for players of wagering games to find friends in a gaming environment
US20100138537A1 (en) * 2007-07-31 2010-06-03 Huawei Technologies Co., Ltd. Method, system and terminal for access control in device management
US20090055205A1 (en) * 2007-08-23 2009-02-26 Igt Multimedia player tracking infrastructure
US20090055911A1 (en) * 2007-08-24 2009-02-26 Assa Abloy Ab Method for computing the entropic value of a dynamical memory system
US20140053248A1 (en) * 2007-08-24 2014-02-20 Assa Abloy Ab Detecting and responding to an atypical behavior
US20140049360A1 (en) * 2007-08-24 2014-02-20 Assa Abloy Ab Data collection using a credential
US20090070081A1 (en) * 2007-09-06 2009-03-12 Igt Predictive modeling in a gaming system
US20090075715A1 (en) * 2007-09-18 2009-03-19 Igt Multi-card bingo game features
US10180962B1 (en) * 2007-09-28 2019-01-15 Iqor Us Inc. Apparatuses, methods and systems for a real-time phone configurer
US9659062B1 (en) * 2007-09-28 2017-05-23 Iqor Holdings Inc. Apparatuses, methods and systems for a global benefits purse facilitator
US7801040B1 (en) * 2007-10-01 2010-09-21 Cisco Technology, Inc. Node registration technique implemented in access networks
US20090110195A1 (en) * 2007-10-31 2009-04-30 Igt Encrypted data installation
US20090131155A1 (en) * 2007-11-12 2009-05-21 Igt Discounted wagering game devices and methods
US20190171434A1 (en) * 2008-01-07 2019-06-06 Xceedid Corporation Systems and methods for programming a credential reader
US20090187978A1 (en) * 2008-01-18 2009-07-23 Yahoo! Inc. Security and authentications in peer-to-peer networks
US7912997B1 (en) * 2008-03-27 2011-03-22 Xilinx, Inc. Direct memory access engine
US20090264190A1 (en) * 2008-04-21 2009-10-22 Igt Customized player alerts
US20090328152A1 (en) * 2008-05-01 2009-12-31 Honeywell International Inc. Method of access control implemented in an ethernet switch
US20090298576A1 (en) * 2008-06-02 2009-12-03 Igt Game production and regulatory approval systems
US8312540B1 (en) * 2008-06-13 2012-11-13 Juniper Networks, Inc. System for slowing password attacks
US20100011007A1 (en) * 2008-07-09 2010-01-14 The Boeing Company Secure high performance multi-level security database systems and methods
US20100029373A1 (en) * 2008-08-01 2010-02-04 Igt Gaming machine printing a ticket for promoting play of a bonus event
US20130234836A1 (en) * 2008-08-08 2013-09-12 Assa Abloy Ab Directional sensing mechanism and communications authentication
US20100061235A1 (en) * 2008-09-05 2010-03-11 Cisco Technology, Inc. Traffic Flow Scheduling Techniques Implemented on Bonded Channels of a Shared Access Cable Network
US20100062838A1 (en) * 2008-09-11 2010-03-11 Igt Flexible determination of gaming and services
US20130003726A1 (en) * 2008-09-11 2013-01-03 Juniper Networks, Inc. Methods and apparatus related to a flexible data center security architecture
US20100116880A1 (en) * 2008-11-10 2010-05-13 Stollman Jeff Methods and apparatus for transacting with multiple domains based on a credential
US20100271951A1 (en) * 2008-11-13 2010-10-28 Genesis Networks, Inc. System and method for transmitting video, audio, and data content using a fiber optic network
US8370911B1 (en) * 2008-11-20 2013-02-05 George Mallard System for integrating multiple access controls systems
US20110247058A1 (en) * 2008-12-02 2011-10-06 Friedrich Kisters On-demand personal identification method
US20100235487A1 (en) * 2009-03-13 2010-09-16 Assa Abloy Ab Use of snmp for management of small footprint devices
US20120039213A1 (en) * 2009-04-03 2012-02-16 Panasonic Corporation Mobile communication method, mobile communication system, and corresponding apparatus
US20100290472A1 (en) * 2009-05-18 2010-11-18 Cisco Technology, Inc. Achieving about an equal number of active links across chassis in a virtual port-channel environment
US20100304819A1 (en) * 2009-05-27 2010-12-02 Igt Contactless player card with improved security
US20100306530A1 (en) * 2009-06-02 2010-12-02 Johnson Robert A Workgroup key wrapping for community of interest membership authentication
US20110030029A1 (en) * 2009-07-29 2011-02-03 James Woo Remote management and network access control of printing devices within secure networks
US9672281B1 (en) * 2009-10-16 2017-06-06 Iqor US. Inc. Apparatuses, methods and systems for a call searcher
US9043355B1 (en) * 2009-10-16 2015-05-26 Iqor U.S. Inc. Apparatuses, methods and systems for a journal entry automator
US9454526B1 (en) * 2009-10-16 2016-09-27 Iqor Holdings Inc., Iqor US Inc. Apparatuses, methods and systems for a chart of accounts simplifier
US9396232B1 (en) * 2009-10-16 2016-07-19 Iqor Holdings, Inc. Apparatuses, methods and systems for a rule-integrated virtual punch clock
US9405799B1 (en) * 2009-10-16 2016-08-02 Iqor Holdings, Inc. Apparatuses, methods and systems for an employee referral facilitator
US8812482B1 (en) * 2009-10-16 2014-08-19 Vikas Kapoor Apparatuses, methods and systems for a data translator
US9053146B1 (en) * 2009-10-16 2015-06-09 Iqor U.S. Inc. Apparatuses, methods and systems for a web access manager
US8489872B1 (en) * 2009-10-16 2013-07-16 Vikas Kapoor Apparatuses, methods and systems for a real-time desktop configurer utilizing a user identifier or an initialization request to retrieve a data-structure-tracking syntax-configured string
US9063978B1 (en) * 2009-10-16 2015-06-23 Igor US Inc. Apparatuses, methods and systems for a financial transaction tagger
US9454576B1 (en) * 2009-10-16 2016-09-27 Iqor Holdings Inc., Iqor US Inc. Apparatuses, methods and systems for an employee onboarding automator
US9098509B1 (en) * 2009-10-16 2015-08-04 Iqor Holding Inc., Igor U.S. Inc. Apparatuses, methods and systems for a call restrictor
US9454577B1 (en) * 2009-10-16 2016-09-27 Iqor Holdings Inc, Iqor US Inc. Apparatuses, methods and systems for an employee reimbursement evaluator
US20120296476A1 (en) * 2009-10-30 2012-11-22 Richard John Cale Environmental control method and system
US20110105208A1 (en) * 2009-10-30 2011-05-05 Igt Managed On-Line Poker Tournaments
US20110201409A1 (en) * 2010-02-17 2011-08-18 Igt Integrated gaming security monitor and ethernet switch
US20110212761A1 (en) * 2010-02-26 2011-09-01 Igt Gaming machine processor
US20120330769A1 (en) * 2010-03-09 2012-12-27 Kodeid, Inc. Electronic transaction techniques implemented over a computer network
US20110225625A1 (en) * 2010-03-15 2011-09-15 Broadcom Corporation Dynamic authentication of a user
US20130036456A1 (en) * 2010-04-08 2013-02-07 Securekey Technologies Inc. Credential provision and proof system
US20110252231A1 (en) * 2010-04-08 2011-10-13 Cisco Technology, Inc. Rekey scheme on high speed links
US20130042011A1 (en) * 2010-04-14 2013-02-14 Panasonic Corporation Communication nodes and network nodes
US20110269529A1 (en) * 2010-04-28 2011-11-03 Igt Systems, Apparatus and Methods for Providing Gaming Applications
US20110276911A1 (en) * 2010-05-06 2011-11-10 Lg Electronics Inc. Mobile terminal and method of controlling the same
US20110289106A1 (en) * 2010-05-21 2011-11-24 Rankin Jr Claiborne R Apparatuses, methods and systems for a lead generating hub
US20130080516A1 (en) * 2010-05-21 2013-03-28 Mark J. Bologh Video delivery expedition apparatuses, methods and systems
US20120069131A1 (en) * 2010-05-28 2012-03-22 Abelow Daniel H Reality alternate
US20120287459A1 (en) * 2010-08-18 2012-11-15 Pettis Nathaniel B Location-based print authorization for three-dimensional printers
US20120131653A1 (en) * 2010-11-19 2012-05-24 Research In Motion Limited System, devices and method for secure authentication
US20120179905A1 (en) * 2011-01-12 2012-07-12 William Rodgers Ackerly Methods and Systems for Distributing Cryptographic Data to Authenticated Recipients
US20120204245A1 (en) * 2011-02-03 2012-08-09 Ting David M T Secure authentication using one-time passwords
US20150248664A1 (en) * 2011-02-16 2015-09-03 Visa International Service Association Snap Mobile Payment Apparatuses, Methods and Systems
US20130346610A1 (en) * 2011-02-24 2013-12-26 Huawei Device Co., Ltd. Device Management Method and Apparatus
US20120315881A1 (en) * 2011-06-13 2012-12-13 Mercury Mobile, Llc Automated notation techniques implemented via mobile devices and/or computer networks
US20120324242A1 (en) * 2011-06-16 2012-12-20 OneID Inc. Method and system for fully encrypted repository
US20120321084A1 (en) * 2011-06-17 2012-12-20 Le Saint Eric F Revocation status using other credentials
US20150120561A1 (en) * 2011-06-17 2015-04-30 Premier Healthcare Exchange, Inc. Healthcare Transaction Facilitation Platform Apparatuses, Methods and Systems
US20240265399A1 (en) * 2011-06-17 2024-08-08 Zelis Payments, Llc Healthcare Transaction Facilitation Platform Apparatuses, Methods and Systems
US20230214941A1 (en) * 2011-06-24 2023-07-06 Monster Worldwide, Inc. Social Match Platform Apparatuses, Methods and Systems
US20140331286A1 (en) * 2011-07-12 2014-11-06 Assa Abloy Ab Event driven second factor credential authentication
US20140373117A1 (en) * 2011-08-31 2014-12-18 Assa Abloy Ab Mobile credential revocation
US20130097348A1 (en) * 2011-09-09 2013-04-18 Assa Abloy Ab Method and system for communicating with and programming a secure element
US20130074171A1 (en) * 2011-09-14 2013-03-21 Jacob Mark Automated login initialization on detection of identifying information
US9270655B1 (en) * 2011-09-30 2016-02-23 Emc Corporation Configurable one-time authentication tokens with improved resilience to attacks
US20130090158A1 (en) * 2011-09-30 2013-04-11 Wms Gaming Inc. System and Method for Assessing and Providing Location-Based Benefits
US20130109307A1 (en) * 2011-10-28 2013-05-02 Hans Reisgies System and method for presentation of multiple nfc credentials during a single nfc transaction
US20130138570A1 (en) * 2011-11-29 2013-05-30 Bruce Ross Layered security for age verification and transaction authorization
US20140052617A1 (en) * 2011-12-13 2014-02-20 Visa International Service Association Payment platform interface widget generation apparatuses, methods and systems
US20130151417A1 (en) * 2011-12-13 2013-06-13 Manav Gupta Dynamic widget generator apparatuses, methods and systems
US20130160072A1 (en) * 2011-12-16 2013-06-20 Microsoft Corporation Personal space (data) v. corporate space (data)
US20130159526A1 (en) * 2011-12-20 2013-06-20 Htc Corporation Method of handling access control information and related communication device
US20130201986A1 (en) * 2012-02-08 2013-08-08 Cisco Technology, Inc. Stitching multicast trees
US20130212661A1 (en) * 2012-02-13 2013-08-15 XceedlD Corporation Credential management system
US20130207775A1 (en) * 2012-02-15 2013-08-15 Honeywell International Inc. Bootstrapping access models in the absence of training data
US20150094075A1 (en) * 2012-03-05 2015-04-02 Sony Corporation Communication control device, communication control method, and base station
US20130238785A1 (en) * 2012-03-06 2013-09-12 Rackspace Us, Inc. System and Method for Metadata Discovery and Metadata-Aware Scheduling
US20160294821A1 (en) * 2012-04-01 2016-10-06 Authentify, Inc. Secure authentication in a multi-party system
US20130290203A1 (en) * 2012-04-27 2013-10-31 Thomas Purves Social Checkout Widget Generation and Integration Apparatuses, Methods and Systems
US20140157370A1 (en) * 2012-05-22 2014-06-05 Hasso-Plattner-Institu für Softwaresystemtechnik GmbH Transparent Control of Access Invoking Real-time Analysis of the Query History
US9564007B2 (en) * 2012-06-04 2017-02-07 Bally Gaming, Inc. Wagering game content based on locations of player check-in
US9992316B2 (en) * 2012-06-15 2018-06-05 Muzik Inc. Interactive networked headphones
US20130346302A1 (en) * 2012-06-20 2013-12-26 Visa International Service Association Remote Portal Bill Payment Platform Apparatuses, Methods and Systems
US20150200925A1 (en) * 2012-07-27 2015-07-16 Assa Abloy Ab Presence-based credential updating
US20140065957A1 (en) * 2012-09-05 2014-03-06 Shishir Gupta Method to implement One Time Readability on NFC Tags
US8616981B1 (en) * 2012-09-12 2013-12-31 Wms Gaming Inc. Systems, methods, and devices for playing wagering games with location-triggered game features
US8769289B1 (en) * 2012-09-14 2014-07-01 Emc Corporation Authentication of a user accessing a protected resource using multi-channel protocol
US20140101679A1 (en) * 2012-10-04 2014-04-10 Verizon Patent And Licensing Inc. Secure transfer of credit card information
US20150295763A1 (en) * 2012-11-12 2015-10-15 Zte Corporation Capability open platform, method and gateway for implementing PNP management of terminal device
US8625796B1 (en) * 2012-11-30 2014-01-07 Mourad Ben Ayed Method for facilitating authentication using proximity
US9015476B1 (en) * 2012-12-07 2015-04-21 Emc Corporation Cryptographic device operable in a challenge-response mode
US9323909B1 (en) * 2012-12-07 2016-04-26 Emc Corporation Sharing a cryptographic device by partitioning challenge-response space
US20140164761A1 (en) * 2012-12-09 2014-06-12 International Business Machines Corporation Secure access using location-based encrypted authorization
US20140181955A1 (en) * 2012-12-21 2014-06-26 Certicom Corp. Two factor authentication using near field communications
US9258234B1 (en) * 2012-12-28 2016-02-09 Juniper Networks, Inc. Dynamically adjusting liveliness detection intervals for periodic network communications
US8955076B1 (en) * 2012-12-28 2015-02-10 Emc Corporation Controlling access to a protected resource using multiple user devices
US20140249825A1 (en) * 2013-03-04 2014-09-04 Hello Inc. Remote communication systems and methods for communicating with a building gateway control to control building systems and elements
US20140249393A1 (en) * 2013-03-04 2014-09-04 Hello Inc. Wireless monitoring of patient exercise and lifestyle
US20140249852A1 (en) * 2013-03-04 2014-09-04 Hello Inc. Methods using patient monitoring devices with unique patient IDs and a telemetry system
US20140247141A1 (en) * 2013-03-04 2014-09-04 Hello Inc. Monitoring device with wireless communication over non-contiguous channels
US20140247148A1 (en) * 2013-03-04 2014-09-04 Hello Inc. Monitoring device with wireless communication using cdma
US20140247152A1 (en) * 2013-03-04 2014-09-04 Hello Inc. Telemetry system with tracking receiver devices
US20140247140A1 (en) * 2013-03-04 2014-09-04 Hello Inc. Monitoring device with selectable wireless communication
US20140246924A1 (en) * 2013-03-04 2014-09-04 Hello Inc. Telemetry system with wireless power receiver and monitoring devices
US20140247153A1 (en) * 2013-03-04 2014-09-04 Hello Inc. Patient monitoring systems and messages that send alerts to patients only when the patient is awake
US20140248853A1 (en) * 2013-03-04 2014-09-04 Wind River Systems, Inc. System And Method for Smart Card Based Hardware Root of Trust on Mobile Platforms Using Near Field Communications
US20130283256A1 (en) * 2013-03-04 2013-10-24 Hello Inc. Telemetry system with remote firmware updates or repair for remote monitoring devices when the monitoring device is not in use by the user
US20140282993A1 (en) * 2013-03-14 2014-09-18 Brivo Systems, Inc. System and Method for Physical Access Control
US9077758B1 (en) * 2013-03-14 2015-07-07 Mobile System 7 Test mode authorization logging
US9420002B1 (en) * 2013-03-14 2016-08-16 Mark McGovern Authorization server access system
US9154304B1 (en) * 2013-03-14 2015-10-06 Emc Corporation Using a token code to control access to data and applications in a mobile platform
US9813285B1 (en) * 2013-03-14 2017-11-07 Ca, Inc. Enterprise server access system
US20160027399A1 (en) * 2013-03-15 2016-01-28 Intel Corporation Mobile computing device technology and systems and methods utilizing the same
US20140298398A1 (en) * 2013-04-02 2014-10-02 Redcloud, Inc. Self-provisioning access control
US20140298483A1 (en) * 2013-04-02 2014-10-02 Canon Kabushiki Kaisha Management device, management system, control method, and storage medium
US20160050213A1 (en) * 2013-04-13 2016-02-18 Digital (Id) Entity Limited System, method, computer program and data signal for the provision of a profile of identification
US20160087957A1 (en) * 2013-04-26 2016-03-24 Interdigital Patent Holdings, Inc. Multi-factor authentication to achieve required authentication assurance level
US20160080343A1 (en) * 2013-04-30 2016-03-17 Assa Abloy Ab Method, apparatus, and system for mobile provisioning of nfc credentials
US20140343989A1 (en) * 2013-05-16 2014-11-20 Phantom Technologies, Inc. Implicitly linking access policies using group names
US20140351096A1 (en) * 2013-05-23 2014-11-27 Katherine Laurel Radziwon Techniques for facilitating acquisition and exchange of ebook and other digital content via a computer network
US20160220177A1 (en) * 2013-06-21 2016-08-04 Hello Inc. Patient monitoring systems and messages that send alerts to patients only when the patient is awake
US20160371696A1 (en) * 2013-06-30 2016-12-22 Schlage Lock Company Llc Secure mode for electronic access control readers
US20150024710A1 (en) * 2013-07-17 2015-01-22 Honeywell International Inc. Secure remote access using wireless network
US20150032891A1 (en) * 2013-07-24 2015-01-29 Keri Systems, Inc. Access Control System
US20160150411A1 (en) * 2013-07-31 2016-05-26 Kuang-Chi Intelligent Photonic Technology Ltd. Authentication system, and transmit terminal, receive terminal, and right authentication method of same
US20150081918A1 (en) * 2013-09-17 2015-03-19 Twilio, Inc. System and method for providing communication platform metadata
US8910263B1 (en) * 2013-09-17 2014-12-09 Iboss, Inc. Mobile device management profile distribution
US20150124822A1 (en) * 2013-11-05 2015-05-07 Cisco Technology, Inc. Managing routing information for tunnel endpoints in overlay networks
US20150124809A1 (en) * 2013-11-05 2015-05-07 Cisco Technology, Inc. Policy enforcement proxy
US20150154360A1 (en) * 2013-12-02 2015-06-04 Caremerge, Llc Systems and methods for secure exchanges of information
US20150188938A1 (en) * 2013-12-31 2015-07-02 Jeremy Freeze-Skret Scene identification system and methods
US20150199684A1 (en) * 2014-01-13 2015-07-16 uQontrol, Inc. Data storage key for secure online transactions
US20150199863A1 (en) * 2014-01-15 2015-07-16 HLT Domestic IP, LLC Systems and methods for use in acquiring credentials from a portable user device in unlocking door lock systems
US20150213723A1 (en) * 2014-01-29 2015-07-30 Apollo Education Group, Inc. Resource Resolver
US20150213691A1 (en) * 2014-01-30 2015-07-30 Brooke Dunn Controlled timing of video gaming sound levels
US20150224387A1 (en) * 2014-02-13 2015-08-13 Young Gi Lee Color war wagering event
US20150228161A1 (en) * 2014-02-13 2015-08-13 Joze Pececnik No-skill, multi-hand blackjack
US20150228155A1 (en) * 2014-02-13 2015-08-13 Mary Gael Hancock Delayed wager increase in video gaming
US20150235506A1 (en) * 2014-02-19 2015-08-20 Ray Smith Multiple gaming choice in keno by players
US20150235518A1 (en) * 2014-02-20 2015-08-20 Elektroncek D.D. Communal play system with individual station secondary play
US10748206B1 (en) * 2014-02-21 2020-08-18 Painted Dog, Inc. Dynamic media-product searching platform apparatuses, methods and systems
US20150248818A1 (en) * 2014-02-28 2015-09-03 He Lin No-commission, asian style baccarat
US20150248820A1 (en) * 2014-02-28 2015-09-03 He Lin No-commission, asian style baccarat
US20150248808A1 (en) * 2014-02-28 2015-09-03 James T. Crawford, III Video wagering system with multi-dimensional cube rotation
US20150254924A1 (en) * 2014-03-05 2015-09-10 Joze Pececnik Mobile, detachable, electronic gaming machine input control
US20150271164A1 (en) * 2014-03-19 2015-09-24 Bluink Ltd Methods and systems for data entry
US20150269369A1 (en) * 2014-03-19 2015-09-24 BluInk Ltd. Methods and systems for data entry
US20150279165A1 (en) * 2014-03-27 2015-10-01 Aron Kock Multiplier side bet in blackjack games
US20150288694A1 (en) * 2014-04-03 2015-10-08 Prote.US Converged Systems Corporation Method and system for secure authentication
US20150310751A1 (en) * 2014-04-24 2015-10-29 Indu Tolia Augmented reality assisted education content creation and management
US20150319166A1 (en) * 2014-05-01 2015-11-05 International Business Machines Corporation Dual-party session key derivation
US20150319144A1 (en) * 2014-05-05 2015-11-05 Citrix Systems, Inc. Facilitating Communication Between Mobile Applications
US9686278B1 (en) * 2014-05-07 2017-06-20 Skyport Systems, Inc. Method and system for configuring computing devices
US9158604B1 (en) * 2014-05-13 2015-10-13 Qualcomm Incorporated Lightweight data-flow tracker for realtime behavioral analysis using control flow
US20150334336A1 (en) * 2014-05-16 2015-11-19 Smart Tlcd Limited Method and system for controlling a display system
US20150347729A1 (en) * 2014-06-02 2015-12-03 Schlage Lock Company Llc Systems and methods for a credential including multiple access privileges
US20150348361A1 (en) * 2014-06-03 2015-12-03 Wms Gaming Inc. Controlling mechanical outcome indicators of gaming machines
US9503442B1 (en) * 2014-06-20 2016-11-22 EMC IP Holding Company LLC Credential-based application programming interface keys
US20170289636A1 (en) * 2014-07-09 2017-10-05 Lg Electronics Inc. Broadcasting signal transmission device, broadcasting signal reception device, broadcasting signal transmission method, and broadcasting signal reception method
US20160013985A1 (en) * 2014-07-10 2016-01-14 Cisco Technology, Inc. On-demand bandwidth provisioning in a network environment
US20170171690A1 (en) * 2014-07-20 2017-06-15 Lg Electronics Inc. Method for terminal-condition-based d2d communication, and apparatus therefor in wireless communication system
US10182056B1 (en) * 2014-07-31 2019-01-15 Open Text Corporation Descendent case role alias
US20170250005A1 (en) * 2014-08-06 2017-08-31 Mido Play Inc. System for multiple jurisdiction lotteries with fraud detection
US20170228975A1 (en) * 2014-08-06 2017-08-10 Mido Play Inc. Systems for multiple legal game providers and multiple jurisdictions that provide notifications of lottery ticket status
US20170250006A1 (en) * 2014-08-06 2017-08-31 Mido Play Inc. Single platform system for multiple jurisdiction lotteries
US20170287594A1 (en) * 2014-08-06 2017-10-05 Mido Play Inc. Systems for multiple legal game providers and multiple jurisdictions with a wallet
US20180096752A1 (en) * 2014-08-06 2018-04-05 Mido Play Inc. Systems for multiple legal game providers with digital ledger
US20160104346A1 (en) * 2014-08-06 2016-04-14 Mido Play Inc. Single platform system for multiple jurisdiction lotteries and social media
WO2016019474A1 (en) * 2014-08-07 2016-02-11 8857911 Canada Inc. Proximity access control devices, systems and related methods
US20160050160A1 (en) * 2014-08-14 2016-02-18 Cisco Technology, Inc. Sharing resources across multiple devices in online meetings
US9203665B1 (en) * 2014-08-23 2015-12-01 Smart Embedded Systems, Inc. Resource optimization by implementing multiple instances of a soft modem with a single microcontroller
US9106488B1 (en) * 2014-08-23 2015-08-11 Smart Embedded Systems, Inc. Energy efficient highway addressable remote transducer soft modem
US20160072904A1 (en) * 2014-09-05 2016-03-10 Openpeak Inc. Method and system for enabling data usage accounting for unreliable transport communication
US9100390B1 (en) * 2014-09-05 2015-08-04 Openpeak Inc. Method and system for enrolling and authenticating computing devices for data usage accounting
US20160074744A1 (en) * 2014-09-15 2016-03-17 Barrett Gaming International Side bet for blackjack game
US20160074746A1 (en) * 2014-09-15 2016-03-17 Barrett Gaming International Side bet for blackjack game
US20160074745A1 (en) * 2014-09-15 2016-03-17 Barrett Gaming International Field side bet for blackjack game
US20160078726A1 (en) * 2014-09-15 2016-03-17 Barrett Gaming International Side bet game with multiplier for blackjack or baccarat
US20160093154A1 (en) * 2014-09-26 2016-03-31 Bally Gaming, Inc. Wagering game wearables
US20180007059A1 (en) * 2014-09-30 2018-01-04 Citrix Systems, Inc. Dynamic Access Control to Network Resources Using Federated Full Domain Logon
US20160099935A1 (en) * 2014-10-01 2016-04-07 VYRTY Corporation Secure access to individual information
US20160133100A1 (en) * 2014-11-09 2016-05-12 Interblock D.D. Slot machine with secondary game content
US20180295561A1 (en) * 2014-11-12 2018-10-11 Nokia Technologies Oy Method and apparatus for cellular access point control
US20160144270A1 (en) * 2014-11-23 2016-05-26 Daniel L. Sahl Oint count wagering game with playing cards
US20160148466A1 (en) * 2014-11-23 2016-05-26 Interblock D.D. System and method for direct charitable contributions from gaming apparatus
US20170345236A1 (en) * 2014-12-02 2017-11-30 Carrier Corporation Access control system with automatic mobile credentialing service hand-off
US20160171836A1 (en) * 2014-12-10 2016-06-16 Jeffery Hwang Super blackjack game
US20160166915A1 (en) * 2014-12-10 2016-06-16 Dongsun Lee Simplified, rapid play of baccarat-type game
US20160166917A1 (en) * 2014-12-10 2016-06-16 Yurong HUANG Three-card wagering system and method
US20160180656A1 (en) * 2014-12-18 2016-06-23 Bally Gaming, Inc. System and method for selective power and secure communications via an electronic gaming machine interface
US20160191494A1 (en) * 2014-12-29 2016-06-30 Vasco Data Security, Inc. Method and apparatus for securing a mobile application
US20160184694A1 (en) * 2014-12-30 2016-06-30 Jeffrey Hwang Wagering game variation based on omaha poker
US20160191236A1 (en) * 2014-12-31 2016-06-30 Sergey Smirnoff Hybrid integration of software development kit with secure execution environment
US20160198501A1 (en) * 2015-01-07 2016-07-07 Cisco Technology, Inc. Wireless roaming using a distributed store
US20160210209A1 (en) * 2015-01-15 2016-07-21 Cisco Technology, Inc. High availability and failover
US20160240039A1 (en) * 2015-01-21 2016-08-18 Andres Gonzalez-Roa Bingo-type wagering game during play of keno or as a distinct game
US20160223218A1 (en) * 2015-01-30 2016-08-04 Schneider Electric It Corporation Automated control and parallel learning hvac apparatuses, methods and systems
US20160220891A1 (en) * 2015-01-31 2016-08-04 Jeffery Hwang Casino table poker wagering event with playing cards
US20160228761A1 (en) * 2015-02-11 2016-08-11 Jeffery J. Hwang Casino table three-card poker wagering event with playing cards
US20180165781A1 (en) * 2015-02-13 2018-06-14 Yoti Holding Limited Digital Identity System
US20160241531A1 (en) * 2015-02-13 2016-08-18 Yoti Ltd Confidence values
US20160239657A1 (en) * 2015-02-13 2016-08-18 Yoti Ltd Digital identity system
US11386107B1 (en) * 2015-02-13 2022-07-12 Omnicom Media Group Holdings Inc. Variable data source dynamic and automatic ingestion and auditing platform apparatuses, methods and systems
US20180176017A1 (en) * 2015-02-13 2018-06-21 Yoti Ltd Digital Identity System
US20160239904A1 (en) * 2015-02-16 2016-08-18 Synergy Blue, Llc Enhanced on-demand service functionality implemented in casino gaming networks
US20180061184A1 (en) * 2015-03-30 2018-03-01 The Board of Regents of the Nevada System of Higher Education on behalf of the University of Video gaming wager systems and methods
US20170294084A1 (en) * 2015-04-03 2017-10-12 Robert Barragan Three-card play of baccarat-type game
US20160292970A1 (en) * 2015-04-03 2016-10-06 Robert Barragan Mix and match blackjack game
US20160287975A1 (en) * 2015-04-03 2016-10-06 Robert Barragan Three-card play of baccarat-type game
US20160309485A1 (en) * 2015-04-20 2016-10-20 Samsung Electronics Co., Ltd. Method and device for supporting communication of electronic device
US20160310830A1 (en) * 2015-04-21 2016-10-27 Jeffery Hwang Casino-table wagering event based on texas holdem
US20180115897A1 (en) * 2015-05-01 2018-04-26 Assa Abloy Ab Wearable discovery for authentication
US20180152444A1 (en) * 2015-05-01 2018-05-31 Assa Abloy Ab Method and apparatus for making a decision on a card
US20160335851A1 (en) * 2015-05-12 2016-11-17 Mark A. Litman Side bets for blackjack or baccarat with optional progressive event
US20180262532A1 (en) * 2015-05-14 2018-09-13 Sequitur Labs, Inc. System and Methods for Facilitating Secure Computing Device Control and Operation
US20160352576A1 (en) * 2015-05-28 2016-12-01 Cisco Technology, Inc. Dynamic attribute based application policy
US10135833B2 (en) * 2015-05-29 2018-11-20 Schlage Lock Company Llc Credential driving an automatic lock update
US20160358408A1 (en) * 2015-06-03 2016-12-08 Mido Play Inc. Methods for multiple legal game providers and multiple jurisdictions with a single platform
US10009240B2 (en) * 2015-06-05 2018-06-26 Cisco Technology, Inc. System and method of recommending policies that result in particular reputation scores for hosts
US11023878B1 (en) * 2015-06-05 2021-06-01 Square, Inc. Apparatuses, methods, and systems for transmitting payment proxy information
US20160364949A1 (en) * 2015-06-11 2016-12-15 Big Bet Gaming Llc Wagering event using multiple card rank comparison
US20160371683A1 (en) * 2015-06-19 2016-12-22 uQontrol, Inc. Multi-purpose data storage key
US20160381080A1 (en) * 2015-06-29 2016-12-29 Citrix Systems, Inc. Systems and methods for flexible, extensible authentication subsystem that enabled enhance security for applications
US20170011368A1 (en) * 2015-07-07 2017-01-12 Marc Trombino Secure credit card identification system
US20170024967A1 (en) * 2015-07-22 2017-01-26 Mark A. Litman Side bets for blackjack or baccarat with optional progressive event
US20170032613A1 (en) * 2015-07-29 2017-02-02 Mido Play Inc. Single platform system for multiple jurisdiction lotteries
US20180332079A1 (en) * 2015-07-31 2018-11-15 Palo Alto Networks, Inc. Efficient and secure user credential store for credentials enforcement using a firewall
US20170039813A1 (en) * 2015-08-03 2017-02-09 Travis Wade Walters Multi-hand poker wagering game
US20180213446A1 (en) * 2015-08-05 2018-07-26 Lg Electronics Inc Communication method using context information of terminal in wireless communication system, and base station
US20170078454A1 (en) * 2015-09-10 2017-03-16 I'm In It, Llc Methods, devices, and systems for determining a subset for autonomous sharing of digital media
US10042808B1 (en) * 2015-09-16 2018-08-07 Xilinx, Inc. Modeling SPI flash memory commands in hardware
US9519901B1 (en) * 2015-09-16 2016-12-13 Square, Inc. Biometric payment technology
US20190036946A1 (en) * 2015-09-17 2019-01-31 Tower-Sec Ltd Systems and methods for detection of malicious activity in vehicle data communication networks
US20170085568A1 (en) * 2015-09-21 2017-03-23 Authentify, Inc. Authenticator centralization and protection
US20170084129A1 (en) * 2015-09-22 2017-03-23 Bally Gaming, Inc. Gaming Systems, Electronic Gaming Machines, And Logic Circuitry For Conducting Skill-Based And Hybrid Gaming
US20170105137A1 (en) * 2015-10-13 2017-04-13 Quanta Computer Inc. Method for reducing load by filtering out broadcast messages
US20180314603A1 (en) * 2015-10-29 2018-11-01 Datto, Inc. Apparatuses, methods, and systems for storage and analysis of saas data and non-saas data for businesses and other organizations
US20170155661A1 (en) * 2015-12-01 2017-06-01 Thi Chau Nguyen-Huu Systems and Methods for Controlling Access to a Computer Device using Traps
US20170169665A1 (en) * 2015-12-12 2017-06-15 Sarah Anne St. John Bonus event in slot machine play
US20170171023A1 (en) * 2015-12-15 2017-06-15 Quanta Computer Inc. Remote zone management of jbod systems
US20190132346A1 (en) * 2015-12-15 2019-05-02 Flying Cloud Technologies, Inc. Distributed Data Surveillance in a Community Capture Environment
US20170180539A1 (en) * 2015-12-17 2017-06-22 Stanley Security Solutions, Inc. Back Channel Authentication Using Smartphones
US20180053262A1 (en) * 2015-12-22 2018-02-22 Hitachi, Ltd. Resource accommodation device, schedule management device, and resource accommodation system
US20170186003A1 (en) * 2015-12-28 2017-06-29 Ncr Corporation Secondary authentication of network transactions
US20170187831A1 (en) * 2015-12-29 2017-06-29 Itron, Inc. Universal Abstraction Layer and Management of Resource Devices
US20170195336A1 (en) * 2016-01-05 2017-07-06 Sensormatic Electronics, LLC Method and System for Non-Authoritative Identity and Identity Permissions Broker and Use Thereof
US10601872B1 (en) * 2016-01-20 2020-03-24 F5 Networks, Inc. Methods for enhancing enforcement of compliance policies based on security violations and devices thereof
US20170228964A1 (en) * 2016-02-08 2017-08-10 Andres Gonzalez-Roa Bingo-type wagering game during play of keno or as a distinct game
US20170244645A1 (en) * 2016-02-23 2017-08-24 Cisco Technology, Inc. Method for improving access control for tcp connections while optimizing hardware resources
US20170264649A1 (en) * 2016-03-11 2017-09-14 Dell Products L.P. Employing session level restrictions to limit access to a redirected interface of a composite device
US10003607B1 (en) * 2016-03-24 2018-06-19 EMC IP Holding Company LLC Automated detection of session-based access anomalies in a computer network through processing of session data
US9805370B1 (en) * 2016-03-31 2017-10-31 Square, Inc. Device fingerprinting at a merchant location
US10163107B1 (en) * 2016-03-31 2018-12-25 Square, Inc. Technical fallback infrastructure
US10636019B1 (en) * 2016-03-31 2020-04-28 Square, Inc. Interactive gratuity platform
US20200351661A1 (en) * 2016-04-11 2020-11-05 Carrier Corporation Capturing personal user intent when interacting with multiple access controls
US10348695B1 (en) * 2016-05-26 2019-07-09 VYRTY Corporation Secure access to individual information
US10366378B1 (en) * 2016-06-30 2019-07-30 Square, Inc. Processing transactions in offline mode
US20180004956A1 (en) * 2016-06-30 2018-01-04 Sequans Communications S.A. Secure Boot and Software Upgrade of A Device
US20190317481A1 (en) * 2016-07-12 2019-10-17 Siemens Aktiengesellschaft Firewall System and Method for Establishing Secured Communications Connections to an Industrial Automation System
US20180027012A1 (en) * 2016-07-20 2018-01-25 Cisco Technology, Inc. Technologies for preventing man-in-the-middle attacks in software defined networks
US20180027020A1 (en) * 2016-07-20 2018-01-25 Cisco Technology, Inc. Automatic port verification and policy application for rogue devices
US20180026872A1 (en) * 2016-07-21 2018-01-25 Cisco Technology, Inc. Detecting and preventing network loops
US20180034718A1 (en) * 2016-07-28 2018-02-01 Cisco Technology, Inc. Detecting and measuring microbursts in a networking device
US20180034822A1 (en) * 2016-07-29 2018-02-01 Citrix Systems, Inc. Computer network providing secure mobile device enrollment features and related methods
US9887975B1 (en) * 2016-08-03 2018-02-06 KryptCo, Inc. Systems and methods for delegated cryptography
US20180040204A1 (en) * 2016-08-04 2018-02-08 Mingcheng Tong 9-8 tie baccarat
US20180063025A1 (en) * 2016-08-29 2018-03-01 Cisco Technology, Inc. Infrastructure aware adaptive resource allocation
US11563695B2 (en) * 2016-08-29 2023-01-24 Cisco Technology, Inc. Queue protection using a shared global memory reserve
US20180070199A1 (en) * 2016-09-06 2018-03-08 Legic Identsystems Ag Method and devices for transmitting a secured data package to a communication device
US20180077573A1 (en) * 2016-09-07 2018-03-15 T-Mobile Usa, Inc. Untrusted device access to services over a cellular network
US9858781B1 (en) * 2016-09-09 2018-01-02 Tyco Integrated Security, LLC Architecture for access management
US20190251768A1 (en) * 2016-09-14 2019-08-15 Carrier Corporation Energy efficient secure wi-fi credentialing for access control systems
US20180091500A1 (en) * 2016-09-23 2018-03-29 Schlage Lock Company Llc Wi-fi enabled credential enrollment reader and credential management system for access control
US20180089446A1 (en) * 2016-09-29 2018-03-29 Fujitsu Limited Apparatus and system for information processing
US11050763B1 (en) * 2016-10-21 2021-06-29 United Services Automobile Association (Usaa) Distributed ledger for network security management
US20180146374A1 (en) * 2016-11-16 2018-05-24 Meir Golan System, methods and software for user authentication
US20180159839A1 (en) * 2016-12-05 2018-06-07 Nortek Security & Control Llc Mobile credential redemption card
US20180167415A1 (en) * 2016-12-08 2018-06-14 Wanclouds Inc. System and Method for Simplifying Mandatory Access Control Policies
US20200092272A1 (en) * 2016-12-12 2020-03-19 Trusona, Inc. Methods and systems for network-enabled account creation using optical detection
US20180182211A1 (en) * 2016-12-22 2018-06-28 Matthew Henry Stream Rapid low total-card blackjack-type game
US20190325673A1 (en) * 2016-12-25 2019-10-24 Avi Roitman Bardack Distributed one-time-use entry code generation for physical access control method of operation and mobile systems
US9940793B1 (en) * 2016-12-30 2018-04-10 Stan Deck Reversing multi-card, multi-hand poker event
US20180190079A1 (en) * 2016-12-30 2018-07-05 Phujohn Nguyen Baccarat version of 4-card pai gow
US20180190076A1 (en) * 2017-01-04 2018-07-05 The Board Of Regents Of The Nevada System Of Higher Education On Behalf Of The University Of Ne Systems And Methods For Gaming Using Historical Data
US10623401B1 (en) * 2017-01-06 2020-04-14 Allstate Insurance Company User authentication based on telematics information
US20200090441A1 (en) * 2017-01-09 2020-03-19 Carrier Corporation Access control system with local mobile key distribution
US20180204411A1 (en) * 2017-01-17 2018-07-19 Stanley Deck Dual gaming element system and method
US20180218573A1 (en) * 2017-01-30 2018-08-02 Troy Pettie Video slot gaming system with positive acting collecaible symbols and collectable event termination symbols
US20190197828A1 (en) * 2017-02-16 2019-06-27 Troy Pettie Skill-assistance in skill-based wagering
US10015795B1 (en) * 2017-03-03 2018-07-03 Bank Of America Corporation Mobile cellular device translation into a secure channel identifier for resource management
US20180270328A1 (en) * 2017-03-14 2018-09-20 Vmware, Inc. Reserving physical resources based upon a physical identifier
US20180308312A1 (en) * 2017-04-19 2018-10-25 Steven Weiss Electronic gaming machine providing winning outcomes after losing events
US20180309632A1 (en) * 2017-04-20 2018-10-25 Cisco Technology, Inc. Policy assurance for service chaining
US20180322742A1 (en) * 2017-05-03 2018-11-08 Timothy Adams Baccarat pattern wagering system
US20180322257A1 (en) * 2017-05-05 2018-11-08 Bank Of America Corporation System for identification of treatment and resource deployment based on treatment interaction
US20180324186A1 (en) * 2017-05-05 2018-11-08 Bank Of America Corporation Person-to-person network architecture for secure authorization and approval
US20180322204A1 (en) * 2017-05-05 2018-11-08 Bank Of America Corporation System for distributed server data management with multi-user access
US20180322475A1 (en) * 2017-05-05 2018-11-08 Bank Of America Corporation System for multi-factor linkage and management for resource distribution
US20180322474A1 (en) * 2017-05-05 2018-11-08 Bank Of America Corporation Machine initiated user status update system
US10089801B1 (en) * 2017-05-15 2018-10-02 Amazon Technologies, Inc. Universal access control device
US20180341411A1 (en) * 2017-05-24 2018-11-29 Cisco Technology, Inc. Intelligent layout of composite data structures in tiered storage
US20180351821A1 (en) * 2017-05-31 2018-12-06 Cisco Technology, Inc. Generating a network-wide logical model for network policy analysis
US20180351782A1 (en) * 2017-05-31 2018-12-06 Cisco Technology, Inc. Associating network policy objects with specific faults corresponding to fault localizations in large-scale network deployment
US20180351788A1 (en) * 2017-05-31 2018-12-06 Cisco Technology, Inc. Fault localization in large-scale network policy deployment
US20180351820A1 (en) * 2017-05-31 2018-12-06 Cisco Technology, Inc. Generating device-level logical models for a network
US20180351791A1 (en) * 2017-05-31 2018-12-06 Cisco Technology, Inc. Network policy analysis for networks
US10650139B2 (en) * 2017-06-12 2020-05-12 Daniel Maurice Lerner Securing temporal digital communications via authentication and validation for wireless user and access devices with securitized containers
US20180367541A1 (en) * 2017-06-16 2018-12-20 Cisco Technology, Inc. System and method for migrating to and maintaining a white-list network security model
US20180367412A1 (en) * 2017-06-16 2018-12-20 Cisco Technology, Inc. Topology explorer
US20180367371A1 (en) * 2017-06-16 2018-12-20 Cisco Technology, Inc. Handling controller and node failure scenarios during data collection
US20180367449A1 (en) * 2017-06-19 2018-12-20 Cisco Technology, Inc. Validation of routing information in a network fabric
US20180367429A1 (en) * 2017-06-19 2018-12-20 Cisco Technology, Inc. Static endpoint validation
US20180367388A1 (en) * 2017-06-19 2018-12-20 Cisco Technology, Inc. Multiprotocol border gateway protocol routing validation
US20180367399A1 (en) * 2017-06-19 2018-12-20 Cisco Technology, Inc. Validating endpoint configurations between nodes
US20180367400A1 (en) * 2017-06-19 2018-12-20 Cisco Technology, Inc. Validation of a virtual port channel (vpc) endpoint in the network fabric
US20180367396A1 (en) * 2017-06-19 2018-12-20 Cisco Technology, Inc. Identifying mismatches between a logical model and node implementation
US20180367526A1 (en) * 2017-06-19 2018-12-20 Citrix Systems, Inc. Systems and methods for dynamic flexible authentication in a cloud service
US20180367397A1 (en) * 2017-06-19 2018-12-20 Cisco Technology, Inc. Endpoint bridge domain subnet validation
US20180367398A1 (en) * 2017-06-19 2018-12-20 Cisco Technology, Inc. Validating tunnel endpoint addresses in a network fabric
US20190028958A1 (en) * 2017-06-23 2019-01-24 Schlage Lock Company Llc Predictive rate limiting for reliable bluetooth low energy connections
US20180374315A1 (en) * 2017-06-27 2018-12-27 Harold Moret, JR. Domino wagering event
US20180369688A1 (en) * 2017-06-27 2018-12-27 Harold Moret, JR. Domino wagering event
US20180374314A1 (en) * 2017-06-27 2018-12-27 Harold Moret, JR. Domino wagering event
US20190026992A1 (en) * 2017-07-18 2019-01-24 Troy Pettie Video poker event with aggregating outcome increaser
US20190028552A1 (en) * 2017-07-20 2019-01-24 Cisco Technology, Inc. Managing a distributed network of function execution environments
US20190025873A1 (en) * 2017-07-21 2019-01-24 Schlage Lock Company Llc Secure real-time clock update in an access control system
US20190028482A1 (en) * 2017-07-21 2019-01-24 Cisco Technology, Inc. Wireless network steering
US20190028478A1 (en) * 2017-07-21 2019-01-24 Schlage Lock Company Llc Leveraging flexible distributed tokens in an access control system
US10034608B1 (en) * 2017-08-14 2018-07-31 Bank Of America Corporation System for receiving transmissions from disparate node and triggering automatic portal action
US20190066452A1 (en) * 2017-08-23 2019-02-28 Kathleen Nylund Jackson Custom deck card game
US20190081852A1 (en) * 2017-09-12 2019-03-14 Cisco Technology, Inc. Event clustering for a network assurance platform
US20190081871A1 (en) * 2017-09-12 2019-03-14 Cisco Technology, Inc. Anomaly detection and reporting in a network assurance appliance
US20190081850A1 (en) * 2017-09-13 2019-03-14 Cisco Technology, Inc. Network assurance event aggregator
US20190253255A1 (en) * 2017-09-25 2019-08-15 Amazon Technologies, Inc. Time-bound secure access
US20190108696A1 (en) * 2017-10-11 2019-04-11 Jean Hugues Wendling Electronic credential reader
US20200241917A1 (en) * 2017-10-13 2020-07-30 Huawei Technologies Co., Ltd. Resource management method and terminal device
US10942666B2 (en) * 2017-10-13 2021-03-09 Cisco Technology, Inc. Using network device replication in distributed storage clusters
US20190114337A1 (en) * 2017-10-18 2019-04-18 Cisco Technology, Inc. Efficient trickle updates in large databases using persistent memory
US20190123983A1 (en) * 2017-10-25 2019-04-25 Cisco Technology, Inc. Data integration and user application framework
US20190123985A1 (en) * 2017-10-25 2019-04-25 Cisco Technology, Inc. Federated network and application data analytics platform
US20190130128A1 (en) * 2017-10-26 2019-05-02 VYRTY Corporation Encryption scheme for making secure patient data available to authorized parties
US20190132326A1 (en) * 2017-10-27 2019-05-02 Cleverdome, Inc. Software Defined Network for Creating a Trusted Network System
US20190130702A1 (en) * 2017-10-28 2019-05-02 Garry Hamud Player versus dealer poker variant with free money provided to a player for continuing game play
US20190130703A1 (en) * 2017-10-29 2019-05-02 Garry Hamud Player versus dealer poker variant with free money provided to a player for continuing game play
US20200344238A1 (en) * 2017-11-03 2020-10-29 Sensormatic Electronics, LLC Methods and System for Controlling Access to Enterprise Resources Based on Tracking
US20190147070A1 (en) * 2017-11-13 2019-05-16 Cisco Technology, Inc. Using persistent memory to enable restartability of bulk load transactions in cloud databases
US20190164387A1 (en) * 2017-11-30 2019-05-30 Vinko Dobrosevic No-bust, player versus player blackjack gaming event
US20190163283A1 (en) * 2017-11-30 2019-05-30 Komodo OpenLab Inc. Configurable device switching mechanism that enables seamless interactions with multiple devices
US20190173847A1 (en) * 2017-12-05 2019-06-06 RELAY WIRELESS NETWORK, LLC d/b/a AERWAVE Adaptive and dynamic network provisioning
US20190173736A1 (en) * 2017-12-05 2019-06-06 Cisco Technology, Inc. Cross-domain assurance
US10185628B1 (en) * 2017-12-07 2019-01-22 Cisco Technology, Inc. System and method for prioritization of data file backups
US20190180566A1 (en) * 2017-12-08 2019-06-13 Jeffery Hwang Novel pai gow card game with asymmetric card distribution
US20190180535A1 (en) * 2017-12-11 2019-06-13 Carrier Corporation On-demand credential for service personnel
US20190197146A1 (en) * 2017-12-21 2019-06-27 Cisco Technology, Inc. Using persistent memory to enable consistent data for batch processing and streaming processing
US20190207976A1 (en) * 2018-01-04 2019-07-04 Cisco Technology, Inc. Network intrusion counter-intelligence
US20190221078A1 (en) * 2018-01-12 2019-07-18 Garry Hamud Advanced strategy blackjack playing card game
US20190230127A1 (en) * 2018-01-25 2019-07-25 Cisco Technology, Inc. Secure publishing for policy updates
US20190230041A1 (en) * 2018-01-25 2019-07-25 Cisco Technology, Inc. Discovery of middleboxes using traffic flow stitching
US20190230035A1 (en) * 2018-01-25 2019-07-25 Cisco Technology, Inc. Network flow stitching using middle box flow stitching
US20190229995A1 (en) * 2018-01-25 2019-07-25 Cisco Technology, Inc. Automatic configuration discovery based on traffic flow data
US20190236911A1 (en) * 2018-01-29 2019-08-01 Ray Smith Specialty decks and blackjack game using the specialty decks
US11062014B1 (en) * 2018-01-30 2021-07-13 Rsa Security Llc Dynamic challenge question-based authentication
US20190238517A1 (en) * 2018-01-31 2019-08-01 The Toronto-Dominion Bank Real-Time Authentication and Authorization Based on Dynamically Generated Cryptographic Data
US20190266847A1 (en) * 2018-01-31 2019-08-29 Tonya Moore Word-based video gaming system in reel format
US20190259246A1 (en) * 2018-02-21 2019-08-22 Mark Yoseloff Multi-game video poker wagering having replay feature
US20190268329A1 (en) * 2018-02-27 2019-08-29 Bank Of America Corporation Preventing Unauthorized Access to Secure Information Systems Using Multi-Factor, Hardware Based and/or Advanced Biometric Authentication
US10366571B1 (en) * 2018-03-06 2019-07-30 Rachel Wurmbrand Electronic gaming machine with projectile which eliminates symbols
US20190297114A1 (en) * 2018-03-20 2019-09-26 Cisco Technology, Inc. On-demand security policy provisioning
US20190311055A1 (en) * 2018-04-04 2019-10-10 Schlage Lock Company Llc Access control with multiple security ecosystems
US20210150835A1 (en) * 2018-04-18 2021-05-20 Carrier Corporation Visualization and management of access levels for access control based al hierarchy
US10819750B1 (en) * 2018-04-27 2020-10-27 Amazon Technologies, Inc. Multi-tenant authentication and permissions framework
US20190349354A1 (en) * 2018-05-09 2019-11-14 Schlage Lock Company Llc Utilizing caveats for wireless credential access
US20190347895A1 (en) * 2018-05-11 2019-11-14 Jeffrey Raske Nine-card poker wagering array
US20190354700A1 (en) * 2018-05-17 2019-11-21 Carrier Corporation Query-Aware Privacy for Access Control Data Analytics
US20190362571A1 (en) * 2018-05-25 2019-11-28 The Well Effect Company Access Control, Resource and Priority Management System and Method
US20190372977A1 (en) * 2018-05-30 2019-12-05 Indoor Robotics Ltd. System and a method for granting ad-hoc access and controlling privileges to physical devices
US20190379635A1 (en) * 2018-06-06 2019-12-12 Cisco Technology, Inc. Service chains for inter-cloud traffic
US20190374213A1 (en) * 2018-06-08 2019-12-12 David S. Goldsmith Ductus sede-entry and prosthetic disorder response systems
US20210112607A1 (en) * 2018-06-13 2021-04-15 Nec Corporation Communication system and communication method
US20190386977A1 (en) * 2018-06-19 2019-12-19 Netgear, Inc. Secure transfer of registered network access devices
US20190386973A1 (en) * 2018-06-19 2019-12-19 Cisco Technology, Inc. Distributed authentication and authorization for rapid scaling of containerized services
US20210110027A1 (en) * 2018-06-25 2021-04-15 Giesecke+Devrient Mobile Security Gmbh Smart card as a security token
US20200007583A1 (en) * 2018-06-27 2020-01-02 Cisco Technology, Inc. Assurance of security rules in a network
US10325087B1 (en) * 2018-07-09 2019-06-18 Capital One Services, Llc Systems and methods for authenticating a user at a public terminal
US11481509B1 (en) * 2018-07-10 2022-10-25 United Services Automobile Association (Usaa) Device management and security through a distributed ledger system
US20200059492A1 (en) * 2018-08-20 2020-02-20 Cisco Technology, Inc. Elastic policy scaling in multi-cloud fabrics
US20210044976A1 (en) * 2018-08-21 2021-02-11 HYPR Corp. Secure mobile initiated authentications to web-services
US10764752B1 (en) * 2018-08-21 2020-09-01 HYPR Corp. Secure mobile initiated authentication
US11632366B1 (en) * 2018-09-28 2023-04-18 F5, Inc. Multi-device authentication
US20200134158A1 (en) * 2018-10-31 2020-04-30 EMC IP Holding Company LLC User Authentication Using Scene Composed of Selected Objects
US20200134146A1 (en) * 2018-10-31 2020-04-30 EMC IP Holding Company LLC Biometric Authentication Using Selected Manipulation of Biometric Samples
US20200137052A1 (en) * 2018-10-31 2020-04-30 EMC IP Holding Company LLC User Authentication Using Biometric Representation of One-Time Passcodes
US20200162467A1 (en) * 2018-11-20 2020-05-21 Cisco Technology, Inc. System and method for migrating existing access control list policies to intent based policies and vice versa
US20210409396A1 (en) * 2018-11-21 2021-12-30 Nec Corporation Information provision system, information provision method, and storage medium
US20200235990A1 (en) * 2019-01-18 2020-07-23 Cisco Technology, Inc. Seamless multi-cloud routing and policy interconnectivity
US20200242227A1 (en) * 2019-01-28 2020-07-30 EMC IP Holding Company LLC Temporary partial authentication value provisioning for offline authentication
US20200242220A1 (en) * 2019-01-28 2020-07-30 EMC IP Holding Company LLC Authentication using user device microphone inputs
US20200244668A1 (en) * 2019-01-28 2020-07-30 Cisco Technology, Inc. Authenticating Client Devices to an Enterprise Network
US20200242222A1 (en) * 2019-01-28 2020-07-30 EMC IP Holding Company LLC User Authentication by Endpoint Device Using Local Policy Engine and Endpoint Data
US20200244670A1 (en) * 2019-01-30 2020-07-30 EMC IP Holding Company LLC Location Assurance Using Location Indicators Modified by Shared Secrets
US20200242225A1 (en) * 2019-01-30 2020-07-30 EMC IP Holding Company LLC Biometric Authentication Using Molecular Snapshots
US20200250042A1 (en) * 2019-01-31 2020-08-06 Rubrik, Inc. Distributed streaming database restores
US20200250044A1 (en) * 2019-01-31 2020-08-06 Rubrik, Inc. Distributed streaming parallel database restores
US20200252212A1 (en) * 2019-02-01 2020-08-06 EMC IP Holding Company LLC Client-Driven Shared Secret Updates for Client Authentication
US20200252392A1 (en) * 2019-02-01 2020-08-06 EMC IP Holding Company LLC Authentication Based on Shared Secret Seed Updates for One-Time Passcode Generation
US20200252385A1 (en) * 2019-02-01 2020-08-06 EMC IP Holding Company LLC Authentication Based on Shared Secret Updates
US20200250340A1 (en) * 2019-02-04 2020-08-06 Hewlett Packard Enterprise Development Lp Security rules compliance for personally identifiable information
US20200287962A1 (en) * 2019-03-05 2020-09-10 Cisco Technology, Inc. Load balancing in a distributed system
US20220210185A1 (en) * 2019-03-14 2022-06-30 Orange Mitigating computer attacks
US20200304508A1 (en) * 2019-03-18 2020-09-24 Samsung Electronics Co., Ltd. Method and device for providing authentication in network-based media processing (nbmp) system
US20210328999A1 (en) * 2019-03-29 2021-10-21 Citrix Systems, Inc. Techniques involving a security heat map
US20200314650A1 (en) * 2019-03-29 2020-10-01 Citrix Systems, Inc. Controlling access to protected resource using a heat map
US20220052792A1 (en) * 2019-04-29 2022-02-17 Lg Electronics Inc. Method and device for determining harq feedback option in nr v2x
US20200382381A1 (en) * 2019-05-29 2020-12-03 Cisco Technology, Inc. Design tool for network performance design and configuration
US20200382519A1 (en) * 2019-05-29 2020-12-03 Cisco Technology, Inc. Enforcing data sovereignty policies in a cloud environment
US20200382505A1 (en) * 2019-05-30 2020-12-03 Bank Of America Corporation Controlling Access to Secure Information Resources Using Rotational Datasets and Dynamically Configurable Data Containers
US20200382506A1 (en) * 2019-05-30 2020-12-03 Bank Of America Corporation Controlling Access to Secure Information Resources Using Rotational Datasets and Dynamically Configurable Data Containers
US20200380147A1 (en) * 2019-05-30 2020-12-03 Bank Of America Corporation Controlling Access to Secure Information Resources Using Rotational Datasets and Dynamically Configurable Data Containers
US20220132471A1 (en) * 2019-07-10 2022-04-28 Lg Electronics Inc. Method and device for determining feedback resource in nr v2x
US20220312422A1 (en) * 2019-08-29 2022-09-29 Lg Electronics Inc. Method and device for selecting resource related to sidelink in nr v2x
US20210075707A1 (en) * 2019-09-06 2021-03-11 Cisco Technology, Inc. Technologies for dynamically generating network topology-based and location-based insights
US10623446B1 (en) * 2019-09-09 2020-04-14 Cyberark Software Ltd. Multi-factor authentication for applications and virtual instance identities
US20210084021A1 (en) * 2019-09-18 2021-03-18 Bioconnect Inc. Access control system
US20210092019A1 (en) * 2019-09-20 2021-03-25 Sonatus, Inc. System, method, and apparatus to extra vehicle communications control
US20220377725A1 (en) * 2019-10-17 2022-11-24 Lg Electronics Inc. Method and apparatus for performing sensing for sidelink communication in nr v2x
US20220408457A1 (en) * 2019-10-31 2022-12-22 Lg Electronics Inc. Method and device for performing sl communication on basis of resource allocation mode 1 in nr v2x
US20240056233A1 (en) * 2019-11-06 2024-02-15 Lg Electronics Inc. Method for user equipment to transmit and receive feedback information in wireless communication system supporting sidelink and device for same
US20220400484A1 (en) * 2019-11-08 2022-12-15 Lg Electronics Inc. Method and device for selecting sl transmission resource in nr v2x
US20220393781A1 (en) * 2019-12-01 2022-12-08 Lg Electronics Inc. Method and apparatus for estimating channel in wireless communication system
US20210194888A1 (en) * 2019-12-23 2021-06-24 Citrix Systems, Inc. Restricted access to sensitive content
US20210289103A1 (en) * 2020-03-10 2021-09-16 Canon Kabushiki Kaisha Scanner, scanner control method, and storage medium
US20210286861A1 (en) * 2020-03-12 2021-09-16 Haworth, Inc. User Experience Container Level Identity Federation and Content Security
US20210295434A1 (en) * 2020-03-19 2021-09-23 Vault Data, LLC Platform for research, analysis, and communications compliance of investment data
US20210304537A1 (en) * 2020-03-28 2021-09-30 Zkteco Usa Unattended touchless health-check screening systems incorporating biometrics and thermographic technologies
US20230208850A1 (en) * 2020-04-23 2023-06-29 Petal Cloud Technology Co., Ltd. Resource Obtaining Method and System, Server, and Storage Medium
US20210409432A1 (en) * 2020-06-26 2021-12-30 AppCensus, Inc. Automatic identification of applications that circumvent permissions and/or obfuscate data flows
US20210409378A1 (en) * 2020-06-30 2021-12-30 Microsoft Technology Licensing, Llc Method and System of Securing VPN Communications
US20220101309A1 (en) * 2020-09-30 2022-03-31 Snap Inc. Cross-platform data management and integration
US20220255931A1 (en) * 2020-10-08 2022-08-11 HYPR Corp. Domain unrestricted mobile initiated login
US20220182239A1 (en) * 2020-12-07 2022-06-09 Accenture Global Solutions Limited Privacy preserving user authentication
US20230142830A1 (en) * 2021-01-15 2023-05-11 Lg Electronics Inc. Method for transmitting/receiving uplink control channel, and device therefor
US20220300296A1 (en) * 2021-03-22 2022-09-22 Rakuten Mobile, Inc. Method and apparatus for constructing a network service
US20230199804A1 (en) * 2021-04-14 2023-06-22 Lg Electronics Inc. Method and device for transmitting or receiving physical sidelink feedback channel in wireless communication system
US20230180266A1 (en) * 2021-05-04 2023-06-08 Lg Electronics Inc. Method and apparatus for determining non-preferred resource in wireless communication system
US20230067168A1 (en) * 2021-08-24 2023-03-02 Rakuten Mobile, Inc. Network service construction graphical user interface, apparatus and method
US20230153449A1 (en) * 2021-11-12 2023-05-18 Microsoft Technology Licensing, Llc System and method of providing granual access control
US20230297714A1 (en) * 2022-03-16 2023-09-21 Snap Inc. Protected data use in third party software applications
US20230354329A1 (en) * 2022-04-28 2023-11-02 Lg Electronics Inc. Method of transmitting and receiving downlink control channel and apparatus therefor
US20230393890A1 (en) * 2022-06-03 2023-12-07 Snap Inc. Auto-recovery for ar wearable devices
US20240078295A1 (en) * 2022-09-02 2024-03-07 Double Zero Systems, devices and methods for authentication and authorization to provide adaptive access to resources
US20240388443A1 (en) * 2023-05-19 2024-11-21 Shore Labs Zbigniew Zemla Browser-based authentication scheme

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
Cai et al "A Novel Mutual Authentication Scheme for Smart Card Without Information Leakage," IEEE Computer Society, Pages 599-604 (Year: 2014) *
Chen et al "Role-based Access Control for Memory Security on Network-on-Chips" IEEE, Pages 1-3 (Year: 2016) *
Kyrillidis et al "Card-Present Transactions on the Internet Using the Smart Card Web Server," IEEE Computer Society, Pages 611-619 (Year: 2013) *
Lin et al "Secure Key Management Scheme for Hierarchical Access Control Based on ECC," IEEE, Pages 335-338 (Year: 2009) *
Liu et al "Access Control in Network Management System," 2009 2nd International Conference on Power Electronics and Intelligent Transportation System," IEEE, Pages 227-230 (Year: 2009) *
Zhao et al "A Flexible-Role and Resource-Based Access Control Model," IEEE Computer Society, Pages 75-79 (Year: 2008) *

Also Published As

Publication number Publication date
US20210084021A1 (en) 2021-03-18
US11736466B2 (en) 2023-08-22

Similar Documents

Publication Publication Date Title
US20230353551A1 (en) Access control system
US11570623B2 (en) Secure communication platform
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
EP2973442B1 (en) Controlling physical access to secure areas via client devices in a networked environment
CN104517338B (en) Distance entrance and its implementation based on wireless network
US10380815B2 (en) Transient asset management systems and methods
US10489997B2 (en) Local access control system management using domain information updates
CN111542027B (en) Method, system and article for controlling safety equipment
CN114679916A (en) Physical access control system and method
US11995931B2 (en) Universal credential
CN115550002B (en) A smart home remote control method and related device based on TEE
US20170046890A1 (en) Physical access management using a domain controller
CN120656261A (en) Access control management system and method based on remote APP control management
KR20180132811A (en) A method for secure interaction between a user and a mobile terminal and additional instances
WO2025004126A1 (en) In-vehicle device and vehicle authentication system
US10645070B2 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
CN101924741A (en) Reliable information input method and electronic device
US20210359995A1 (en) Secure access control
Mohamed et al. ABACS: Attribute-Based Access Control System using digital keys
RU2825278C1 (en) Method of controlling and managing access
KR20250064080A (en) Apparatus and Method for Distinguishing Relay/Replay Signal in Passive Keyless Entry System
KR20250163226A (en) Lock device control method
EP4466687A1 (en) Physical access using cloud transaction

Legal Events

Date Code Title Description
AS Assignment

Owner name: BIOCONNECT INC., CANADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GIBSON, COURTNEY RYAN;DOUGLAS, ROBERT;REEL/FRAME:064155/0424

Effective date: 20190926

Owner name: BIOCONNECT INC., CANADA

Free format text: ASSIGNMENT OF ASSIGNOR'S INTEREST;ASSIGNORS:GIBSON, COURTNEY RYAN;DOUGLAS, ROBERT;REEL/FRAME:064155/0424

Effective date: 20190926

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

AS Assignment

Owner name: MEDIXSAFE INC., CANADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BIOCONNECT INC.;REEL/FRAME:071616/0399

Effective date: 20250630

Owner name: MEDIXSAFE INC., CANADA

Free format text: ASSIGNMENT OF ASSIGNOR'S INTEREST;ASSIGNOR:BIOCONNECT INC.;REEL/FRAME:071616/0399

Effective date: 20250630

STPP Information on status: patent application and granting procedure in general

Free format text: ADVISORY ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION COUNTED, NOT YET MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER