G06F2221/2103

SYSTEM AND METHODS FOR PUF-BASED AUTHENTICATION
20230216838 · 2023-07-06 ·

Authentication that leverages a Physical Unclonable Function (PUF) to generate bitstrings, session keys and long-lived keys (LLK).

SYSTEMS AND METHODS FOR AUTHENTICATING COMPONENTS ON AN ELECTRONIC DEVICE

In some examples, a method comprises determining, at an electronic device having a first component of a first component type, a unique identifier associated with the first component. In some examples, in accordance with a determination that the unique identifier does not match the expected identifier of the component of the first component type in the electronic device, determining that the first component associated with the unique identifier satisfies one or more eligibility criteria. In some examples, in accordance with the determination that the first component associated with the unique identifier satisfies the one or more eligibility criteria, authenticating an association of the first component with the electronic device, including updating an installation counter associated with the first component, and updating the expected identifier for the component of the first type based on the unique identifier of the first component.

Creating and Using Device Orientation Fingerprints
20230214463 · 2023-07-06 · ·

Creating and using device orientation fingerprints can include detecting a request to create an orientation fingerprint for a user device, where the orientation fingerprint defines an orientation of the user device and includes a machine learning model that models, for the user device and a known user of the user device, multiple orientations of the device for multiple activities. Operational data that includes orientation data, identity data, and activity data can be obtained. The operational data can be provided to machine learning to output the orientation fingerprint and the orientation fingerprint can be stored with data that associates the orientation fingerprint with the known user.

Authenticating a user via a customized image-based challenge

Systems and methods for authenticating a user via a customized image-based challenge are disclosed. In embodiments, a computer-implemented method comprises: receiving an access request from a user requesting access to content; generating a list of items recommended for the user based on computer-based user behavior data; selecting from the list of recommended items: a first set of items and a second set of items, wherein the first set of items are associated with a characteristic and the second set of items are not associated with the characteristic; generating an image-based challenge comprising a test question to be answered by the user and a plurality of selectable images including images of each of the first set of items and images of each of the second set of items; and providing the image-based challenge to a user computer device of the user.

Dynamic Question Presentation in Computer-Based Authentication Processes

Methods, systems, and apparatuses are described herein for improving computer authentication processes by dynamically adjusting questions presented during authentication. A request for access to an account may be received. A first authentication question may be generated based on a first transaction of a plurality of transactions associated with an account. Based on whether a response to the first authentication question is correct or not, a second or third transaction of the plurality of transactions may be selected, and a second authentication question might be generated based on the selected transaction. It may be determined whether to provide access to the account based on a response to the second authentication question.

Methods and systems for acoustic authentication
11544370 · 2023-01-03 · ·

Systems and methods are disclosed for generating an acoustic authentication data entry interface. One method comprises generating a random sequence of characters and a visual user interface element comprising a plurality sections, each section of the visual user interface element being associated with a respective character of the generated random sequence of characters. A section of the visual user interface elements is displayed to a user. Concurrently, an audio recording of a character associated with the displayed section is played to the user. Based on determining user selection of the displayed section, the character associated with the displayed section is logged as part of an authentication data. When all of the characters constituting the authentication data are logged, an electronic transaction authorization request is sent to an acquirer processor.

Preventing Unauthorized Access to Personal Data During Authentication Processes

Methods, systems, and apparatuses are described herein for improving the security of personal information by preventing attempts at gleaning personal information from authentication questions. A computing device may receive a request for access to an account associated with a user. The request may comprise candidate authentication information. Based on comparing the candidate authentication information with the account data, the computing device may generate a synthetic authentication question. The synthetic authentication question may be generated as if the candidate authentication information is valid. A response to the synthetic authentication question may be received, and the request for access to the account may be denied.

SECURING VISIBLE DATA

A method, computer system, and a computer program product for securing visible data is provided. The present invention may include encrypting an on-screen data rendered on a display of an endpoint device. The present invention may also include authenticating an external decryption device within a periphery defined by the endpoint device. The present invention may further include decrypting the encrypted on-screen data on the authenticated external decryption device.

SYSTEMS AND METHODS FOR SECURE ADAPTIVE ILLUSTRATIONS
20220414193 · 2022-12-29 ·

Systems and methods for adaptive verification may include a memory and a processor. The memory may be configured to store a plurality of animation templates. The processor may be configured to perform a first challenge process to request a first user image from a first predetermined distance, receive the first user image, request a second user image from a second predetermined distance, receive the second user image, transmit the first user image and the second user image for a verification process, the verification process including identification of one or more user attributes, receive a third user image associated with the one or more user attributes identified during the verification, and display the third user image including an adaptation, wherein the adaptation is generated for at least one of the plurality of animation templates, the adaptation illustrating the one or more user attributes.

PROVIDING ACCESS CONTROL TO DISTRIBUTED RESOURCES TO AN INFORMATION HANDLING SYSTEM

Providing access control to distributed resources, including storing, at a computing dock coupled to an information handling system, a local access database indicating verified credentials of one or more users; receiving, at the computing dock, a request for access to a resource coupled to the computing dock; providing, in response to the request for access, an authentication request to an authentication system; in response to the authentication request, providing, by the computing dock, an authentication challenge to the information handling system; receiving, at the computing dock and in response to the authentication challenge, user credentials at the authentication system; verifying, at the authentication system, the user credentials against the local access database; providing, based on the verified user credentials, an authorization token to the first device; and allocating, based on the authorization token, access to the resource to the information handling system.