Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Nok Nok Labs Inc patents


Recent patent applications related to Nok Nok Labs Inc. Nok Nok Labs Inc is listed as an Agent/Assignee. Note: Nok Nok Labs Inc may have other listings under different names/spellings. We're not affiliated with Nok Nok Labs Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "N" | Nok Nok Labs Inc-related inventors


System and method for bootstrapping a user binding

A system, apparatus, method, and machine readable medium are described for bootstrapping an authenticator. For example, one embodiment of a method comprising: confirming an identity of a user by a first relying party using a first identity verification technique responsive to the user acquiring a device having an authenticator; generating or collecting initial user verification reference data upon verifying the identity of the user through the first identity verification technique; securely providing the initial user verification reference data or data derived from the initial user verification reference data to the authenticator; the authenticator implementing a second identity verification technique by comparing the initial user verification reference data or data derived from the initial user verification reference data to data collected from the user or data collected from a device provided to the user; and providing proof of a successful verification of the identity of the user to a second relying party during a registration request of the authenticator with the second relying party.. ... Nok Nok Labs Inc

System and method for sharing keys across authenticators

A system, apparatus, method, and machine readable medium are described for sharing authentication data. For example, one embodiment of a method comprises: generating and storing a persistent group identification code (group-id) for a group of authenticators sharing a common set of authorization (uauth) keys, an initial group-id to be generated on a first use of a first authenticator and/or following a factory reset of the first authenticator generating and storing an individual asymmetric wrapping key encryption key (wkek) on a first use of the first authenticator and/or following each factory reset of the first authenticator; generating and storing a symmetric wrapping key (wk), the wrapping key to be generated on a first use of the first authenticator and/or following each factory reset of the first authenticator; generating a join-block using an authenticator identification code for the first authenticator and the wkek, the join-block usable to join an existing authenticator group, the join block to be sent to a second authenticator; verifying the join-block at the second authenticator and generating a join response block responsive to user approval, the join response block generated by encrypting the wk and group-id using the wkek, the join response block to be transmitted to the first authenticator; and decrypting the join response block and storing the wk and group-id.. ... Nok Nok Labs Inc

Authentication techniques including speech and/or lip movement analysis

A system, apparatus, method, and machine readable medium are described for attesting an authenticator. For example, one embodiment of an apparatus comprises: a processor to execute an app; and an authenticator to generate a first authentication key and to securely store the first authentication key, the authenticator to generate an attestation object usable by a relying party to confirm authenticity of the authenticator, the attestation object including a first component provided by the authenticator, a second component provided by the app, and a signature generated by the first authentication key over a combination of the first and second components.. ... Nok Nok Labs Inc

Authentication techniques including speech and/or lip movement analysis

A system, apparatus, method, and machine readable medium are described for performing eye tracking during authentication. For example, one embodiment of a method comprises: receiving a request to authenticate a user; presenting one or more screen layouts to the user; capturing a sequence of images which include the user's eyes as the one or more screen layouts are displayed; and (a) performing eye movement detection across the sequence of images to identify a correlation between motion of the user's eyes as the one or more screen layouts are presented and an expected motion of the user's eyes as the one or more screen layouts are presented and/or (b) measuring the eye's pupil size to identify a correlation between the effective light intensity of the screen and its effect on the user's eye pupil size; capturing audio of the user's voice; and performing voice recognition techniques to determine a correlation between the captured audio of the user's voice and one or more voice prints.. ... Nok Nok Labs Inc

Web-based user authentication techniques and applications

A system, apparatus, method, and machine readable medium are described for performing user authentication. For example, one embodiment of a system comprises: media capture logic implemented as a component within a browser executed on a client, the media capture logic configured to capture a user's voice from a microphone on a client or images of the user's face or other portion of the user's body from a camera on the client, the media capture logic exposing an application programming interface (api); and a web authentication application implemented as another component within the browser for communicating with an authentication server to perform biometric authentication of a user, the web authentication application making calls to the api of the media capture logic to capture raw biometric data comprising the user's voice from the microphone and/or images of the user's face or other portion of the user's body from the camera, the web authentication application to implement a biometric authentication process to authenticate the user with the raw biometric data.. ... Nok Nok Labs Inc

System and method for implementing a one-time-password using asymmetric cryptography

A system, apparatus, method, and machine readable medium are described for authentication with asymmetric cryptography. For example, a method in accordance with one embodiment comprises: generating a challenge at a server; encrypting the challenge at the server using a public encryption key; transmitting the encrypted challenge to a connected device having a first connection over a network with the server; providing the encrypted challenge from the connected device to a user device; decrypting the encrypted challenge using a private encryption key corresponding to the public encryption key to determine the challenge; converting the challenge to a converted challenge, the converted challenge having a different format than the original challenge; receiving the converted challenge at the connected device and providing the converted challenge from the connected device to the server; and validating the converted challenge at the server to authenticate the user.. ... Nok Nok Labs Inc

System and method for carrying strong authentication events over different channels

A system, apparatus, method, and machine readable medium are described for performing authentication over multiple channels. For example, one embodiment of a method comprises: performing authentication over a network with an authentication service to authenticate a client; responsively generating a token at the authentication service, the token including identification information for the client, a service, and a type of authenticator used for the authentication, the token further including verification data; transmitting the token to the client; transmitting the token from the client to the service, the service using the verification data to verify the token and allowing one or more transactions with the client in accordance with a policy based, at least in part, on the type of authenticator used for the authentication.. ... Nok Nok Labs Inc

System and method for performing authentication using data analytics

A system, apparatus, method, and machine readable medium are described for performing authentication using data analytics such as machine learning. For example, one embodiment of a method comprises: selecting a set of parameters related to user activity on a client device; receiving a request to authenticate the user for a current transaction; responsively calculating a distance between parameters associated with the current transaction and historical parameters from an existing dataset; determining a risk level associated with the current transaction based on the calculated distances between the parameters associated with the current transaction and the historical parameters; selecting one or more authentication techniques required to authenticate the user based on the risk level; performing the one or more authentication techniques to attempt to authenticate the user and generating an authentication result; and updating the historical parameters using the parameters associated with the current transaction and the authentication result.. ... Nok Nok Labs Inc

Enhanced security for registration of authentication devices

A system, apparatus, method, and machine readable medium are described for enhanced security during registration. For example, one embodiment of a method comprises: receiving a request at a relying party to register an authenticator; sending a code from the user to the relying party through an authenticated out-of-band communication channel; and verifying the identity of the user using the code and responsively registering the authenticator in response to a positive verification.. ... Nok Nok Labs Inc

System and method for integrating an authentication service within a network architecture

A system and method are described for integrating an authentication service within an existing network infrastructure. One embodiment of a method comprises: configuring a gateway to restrict access to an internal network; configuring an authentication client of a client device to establish a communication channel with the authentication server and to register one or more authentication devices with the authentication server; authenticating the user with the authentication server using one or more of the registered authentication devices in response to an attempt to gain access to the internal network via the gateway; providing the client device with a cryptographic data structure in response to a successful authentication; providing the cryptographic data structure to the gateway as proof of the successful authentication; validating the cryptographic data structure with the authentication server; providing access to the gateway upon receiving an indication from the authentication server that the cryptographic data structure is valid.. ... Nok Nok Labs Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Nok Nok Labs Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Nok Nok Labs Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###