G06F2221/2103

AUTHENTICATION METHOD, CORRESPONDING DEVICE AND PROGRAM
20220407854 · 2022-12-22 ·

A method for authenticating access via a communication terminal, before a server is disclosed. The method includes, subsequently to the transmission by an access application of the communication terminal, to the server, of a connection request: transforming a variable element, received from the server, using transformation materials obtained upon a subscription before the server, outputting a transformed element; transmitting to the server, an identifier associated to the access and to the transformed element; and receiving an authentication of the access, originating from the server taking the transformed element into account.

SYSTEMS AND METHODS FOR CONTACTLESS CARD COMMUNICATION AND MULTI-DEVICE KEY PAIR CRYPTOGRAPHIC AUTHENTICATION
20220407723 · 2022-12-22 ·

Systems and methods for authentication may include an authenticator. The authenticator may include a processor and a memory. The processor may be configured to: receive one or more challenges; generate a first instruction, the first instruction including a request to retrieve a first Fast Identity Online (FIDO) key; transmit the first instruction; receive the first FIDO key; sign the one or more challenges using the first FIDO key; and transmit one or more signed challenges for validation using a second FIDO key.

Access controlling network architectures utilizing novel cellular signaled access control and machine-learning techniques to identify, rank modify and/or control automated programmable entities (such as robots/bots) and their visual schemas, and methods for use thereof
11533619 · 2022-12-20 · ·

In some embodiments, an exemplary access controlling network architecture may include: a computer platform configured to: receive, from an online entity, an action performance request; request, from an access controlling platform, an expected access control digital key to be presented to the online entity; receive the expected access control digital key; instruct to display the expected access control digital key at a computing device; cause a mobile originating communication, having the expected access control digital key and an identity linked to the computing device; determine a lack of a receipt of the access authentication indicator associated with the online entity from the access controlling platform; and perform, due to, for example, the online entity being a BOT, one of: modifying a visual schema of the online entity, disabling the online entity, or suspending one of: a performance of the online entity or the performance of the action by the online entity.

BAGGAGE-BASED IDENTIFICATION AND VERIFICATION SYSTEM AND METHOD
20220398300 · 2022-12-15 ·

Systems and methods for baggage identification and baggage-based user identity verification are described. In one embodiment, a user device receives a challenge message associated with a baggage item, from a server. In response, the device outputs, by an augmented or mixed reality user interface, a prompt to respond to the challenge using the baggage item. The augmented or mixed reality user interface receives a user's response to the challenge message, the response identifying a user-defined location on the baggage item. The device generates a response to the challenge message based on the identified location. The response is transmitted to the server, whereby a result is received from the server based on verification of the user-defined location communicated via the challenge response. Other embodiments are also described.

FUNCTION EXECUTING DEVICE, SERVER, AND COMMUNICATION SYSTEM
20220400014 · 2022-12-15 ·

A function executing device may cause a first output unit to output first output information including location information of a server that is configured to operate according to a predetermined authentication scheme. The first output information may be acquired by a terminal device configured to operate according to the predetermined authentication scheme. The terminal device may be configured to access the server, receive first verification information, create signature information by encrypting the first verification information using a private key in a case where first authentication for a target user succeeds, and send the signature information to the server. The server may be configured to decrypt the signature information using a public key, and send an execution instruction to the function executing device in a case where the first verification information is acquired by decrypting the signature information. The function executing device may execute a specific function.

Login and authentication methods and systems

Systems, methods, and apparatuses for authenticating requests to access one or more accounts over a network using authenticity evaluations of two or more automated decision engines are discussed. A login request for access to a user account may be submitted to multiple decision engines that each apply different rulesets for authenticating the login request, and output an evaluation of the authenticity of the login request. Based on evaluations from multiple automated decision engines, the login request may be allowed to proceed to validation of user identity and, if user identity is validated, access to the user account may be authorized. Based on the evaluations, the login attempt may also be rejected. One or more additional challenge question may be returned to the computing device used to request account access, and the login request allowed to proceed to validation of identity if the response to the challenge question is deemed acceptable.

Optimized access in a service environment
11528144 · 2022-12-13 · ·

A method including transmitting, by a processor associated with a user device, a request to determine a signature key; receiving, by the processor, a unique identifier associated with the signature key; authenticating, by the processor, received biometric information; selectively transmitting, by the processor based at least in part on a result of authenticating the biometric information, a signature request that includes the unique identifier in association with validation data to indicate that the signature key, associated with the unique identifier, is to be utilized to sign the validation data; and receiving, by the processor, signed validation data that is signed based at least in part on utilizing the signature key. Various other aspects are contemplated.

BINDING A TRUST ANCHOR AND AN ASIC
20220382866 · 2022-12-01 ·

According to certain embodiments, a method comprises performing a posture assessment at a trust anchor in order to determine whether a hardware component is authorized to run on a product. Performing the posture assessment comprises determining a random value (K), encrypting the random value (K) using a long-term key associated with the hardware component in order to yield an encrypted value, communicating the encrypted value to the hardware component, and determining whether the hardware component is authorized to run on the product based at least in part on whether the trust anchor receives, from the hardware component, a response encrypted using the random value (K). The method further comprises allowing or preventing the hardware component from running on the product based on whether the hardware component is authorized to run on the product.

Method and system for self-sovereign information management

The present teaching relates to method, system, medium, and implementation for secure data management by a service provider. A request is first received for carrying out a transaction with a user and one or more data items associated with the user are then determined that need to be validated prior to the transaction. A request is then sent to the user seeking to validate the one or more data items. When a cloaked identifier is received from the user with information related to a trusted party, the cloaked identifier is then sent to the trusted party with a request for a validation response. When the validation response is received with an indication that the one or more data items are validated, the transaction with the user is carried out.

System and method for serving subject access requests

Systems and methods for serving subject access requests (SARs) are disclosed. A network connection is established with a user. An SAR, including at least one piece of personal data corresponding to an entity associated with said user, is received from the user via the network connection. Text data is extracted from a plurality of data objects, the data objects including personal data associated with the user. The text data is then processed to identify instances of names and instances of personal data within the text data. Associations are generated between identified names and identified personal data. A subset of the identified personal data that corresponds to the entity is identified based on the associations. A response to the SAR is provided, based at least in part on the identified personal data corresponding to the entity.