G06F21/31

USER AUTHENTICATION DEVICE, USER AUTHENTICATION METHOD, AND USER AUTHENTICATION COMPUTER PROGRAM

A user authentication device includes: a collection part collecting information of a user; a generation part generating a question for the user on the basis of the information of the user collected by the collection part and a skill model of the user; a presentation part presenting the question for the user generated by the generation part to the user; a reception part receiving, from the user, a response to the question presented by the presentation part; and a determination part determining authentication of the user on the basis of the response received by the reception part.

Systems and Methods for Automating Processes for Remote Work

A method may include a method of automating processes for remote work. The method may include receiving, at a server, first login data from a client software application. The client software application may be executing on a user device of a remote worker user. The method may include authenticating the remote worker user based on the first login data. The method may include receiving, at the server, command data from the client software application. The command data may include data indicating to the server to launch a software application. The method may include launching, on the server, the software application. The method may include inputting, using a robotic process automation (RPA) process, second login data of the remote worker user into the software application. The method may include key site information, speech-to-text functionality, onboarding functionality, automated support, or activity logging.

User interface for managing access to credentials for use in an operation

The present disclosure generally relates to managing access to credentials. In some examples, an electronic device authorizes release of credentials for use in an operation for which authorization is required. In some examples, an electronic device causes display of one or more steps to be taken to enable an input device for user input. In some examples, an electronic device disambiguates between commands to change the account that is actively logged-in on the device and commands to cause credentials to be released from the secure element.

User interface for managing access to credentials for use in an operation

The present disclosure generally relates to managing access to credentials. In some examples, an electronic device authorizes release of credentials for use in an operation for which authorization is required. In some examples, an electronic device causes display of one or more steps to be taken to enable an input device for user input. In some examples, an electronic device disambiguates between commands to change the account that is actively logged-in on the device and commands to cause credentials to be released from the secure element.

Static Authentication Questions for Account Authentication

Methods, systems, and apparatuses are described herein for improving computer authentication processes using static authentication questions with answers that change based on user account information. A request for access to an account may be received. A static question may be received. The static question may comprise one or more prompts and a plurality of different predetermined answers. Transaction data may be received. Based on the transaction data, a portion of the plurality of different predetermined answers may that correspond to correct answers may be determined. The question may be presented to a user, and a candidate response may be received. Access to the account may be provided based on the candidate response.

SCHEME EVALUATION AUTHENTICATION SYSTEM

Embodiments of the invention are directed to systems, methods, and computer program products for a scheme evaluation authentication system to evaluate user action and machine learned pattern recognition for misappropriation activity prevention. In this way, bot and token deployment is utilized for identification of user actions to generate a user idiosyncrasy database. Using the database, the system creates a real-time scheme evaluation authentication for user authentication upon user attempted authentications. As such, a user may by authenticate irrespective of user inputs, but instead based on a match of user actions at the authentication location in real-time compared to the idiosyncrasy database.

Adaptive authentication
11575678 · 2023-02-07 · ·

Provided is adaptive authentication that utilizes relational analysis, sentiment analysis, or both relational analysis and sentiment analysis to facilitate an authentication procedure. The relational analysis evaluates a transactional profile and a behavioral profile of the user. The sentiment analysis evaluates available user information that is obtained from various forms of Internet activity related to the user. A level of authentication is selectively modified based on a result of the relational analysis and/or the sentiment analysis.

Scoring events using noise-contrastive estimation for anomaly detection
11593639 · 2023-02-28 · ·

Techniques for monitoring a computing environment for anomalous activity are presented. An example method includes receiving a request to invoke an action within the computing environment. An anomaly score is generated for the received request by applying a probabilistic model to properties of the request. The anomaly score generally indicates a likelihood that the properties of the request correspond to historical activity within the computing environment for a user associated with the request. The probabilistic model generally comprises a model having been trained using historical activity within the computing environment for a plurality of users, the historical activity including information identifying an action performed in the computing environment and contextual information about a historical request. Based on the generated anomaly score, one or more actions are taken to process the request such that execution of requests having anomaly scores indicative of unexpected activity may be blocked pending confirmation.

Method and system for monitoring and providing beneficial visual and auditory stimulation for dementia patients
11589799 · 2023-02-28 ·

An on-person portable device and/or app that allows for constant location monitoring of dementia patients is disclosed. Such a device and/or app also includes automated communication of facial recognition of persons proximally near such a patient as well as possible generation of certain music in response to patient status and/or location. The patient is provided the device and/or app for handling or wearing, such as a phone or pair of glasses, in order to follow location through GPS monitoring, and a reactive program therein that automatically views another person and provides an identification thereof coupled with a voice modulator within an earpiece or like device for memory stimulation pertaining to loved ones or friends, and the like. The same program may also provide the music response to comments, movement, or any other external stimuli to the subject patient, again, to evoke a memory stimulus, as well.

Method and system for monitoring and providing beneficial visual and auditory stimulation for dementia patients
11589799 · 2023-02-28 ·

An on-person portable device and/or app that allows for constant location monitoring of dementia patients is disclosed. Such a device and/or app also includes automated communication of facial recognition of persons proximally near such a patient as well as possible generation of certain music in response to patient status and/or location. The patient is provided the device and/or app for handling or wearing, such as a phone or pair of glasses, in order to follow location through GPS monitoring, and a reactive program therein that automatically views another person and provides an identification thereof coupled with a voice modulator within an earpiece or like device for memory stimulation pertaining to loved ones or friends, and the like. The same program may also provide the music response to comments, movement, or any other external stimuli to the subject patient, again, to evoke a memory stimulus, as well.