Patent classifications
G06F2221/2103
Method and chip for authenticating to a device and corresponding authentication device and system
The invention relates to a method for authenticating to a device, comprising receiving, by the device, from a chip, data; retrieving, by the device, based on the received data, a predetermined encrypted credential; sending, by the device, to the chip, a decryption request for decrypting the encrypted credential including or being accompanied with the encrypted credential to be decrypted; retrieving, by the chip, a secret key; decrypting, by the chip, the encrypted credential by using the secret key; sending, by the chip, to the device, as a decryption request response, the credential; verifying, by the device, whether the credential is or is not valid; and authenticating, by the device, only if the credential is valid, the chip.
AUTHENTICATION SYSTEM FOR AUTHENTICATION OF STUDENT SUBMISSIONS
In accordance with one embodiment of the present disclosure, a method for author verification includes extracting, with a processor, text data from an electronic document to produce a plurality of sentences, extracting, with a natural language processing (NLP) tool, a plurality of keywords from the text data, selecting, with the processor, a sentence from the plurality of sentences based on the plurality of keywords, identifying, with the processor, a keyword of the sentence, wherein the keyword is included within the plurality of keywords, and transforming, with the processor and the NLP tool, the keyword into an authentication output provided for display to a user on an electronic display, the authentication output comprising one or more answer options based on the keyword and being selectable by the user via a user input device.
Automated ID proofing using a random multitude of real-time behavioral biometric samplings
A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.
SYSTEM AND METHOD FOR TIME-BASED CRYPTOGRAPHY
Systems and methods of performing time-based cryptography verification for a server having a trusted execution environment (TEE), including: sending, by the server, a verifiable delay function (VDF) challenge at the TEE to a computing device, solving, by the computing device, the VDF challenge, and blocking, by the server, access to the TEE when the VDF challenge is not complete from the computing device.
DYNAMIC SECURITY CHALLENGE AUTHENTICATION
A method for dynamic security challenge authentication may include generating, based on data about one or more previous interactions of the user with a plurality of applications, files, and devices, one or more security challenges. Examples of interactions include launching an application, editing a file, and logging onto a device. The data may be retrieved from services or components involved with the interactions. The identity of the user may be authenticated based on the responses to the security challenges. Related systems and computer program products are also provided.
COMPUTER-BASED SYSTEMS CONFIGURED FOR MANAGING PERMISSION MESSAGES IN A DATABASE AND METHODS OF USE THEREOF
A method includes receiving a permission request from a user to perform an operation in a computer environment. Data elements of operations previously performed by a plurality of users are received. A set of operation types are generated by identifying data elements of operations previously performed by other users of the plurality of users having operation types performed by the user. The data elements in the set are mapped into a graph database. Permission messages are generated with a correct response identified from a data attribute from a specific operation type previously performed by the user, and wrong responses identified from the specific operation type previously performed by the other users. An accumulated probability based on the permission respond message is computed using the graph database. The user is tagged based on the accumulated probability as a permissioned user for performing the operation, or a non-permissioned violator user.
Authentication using cognitive analysis
A method for dynamically authenticating and granting access to a computing system may be provided. The method comprises deriving at least one authentication question from at least one identified fact contained in a received text data. The at least one identified fact is stored in a knowledge base relating to a user profile. The method comprises conducting a textual authentication dialog. The textual authentication dialog comprises presenting the at least one authentication question and determining, based on natural language processing, that a received response comprises the at least one identified fact from which the at least one authentication question has been derived. The method comprises granting access to the computing system based on the textual authentication dialog.
Authentication, authorization and audit of digital assets using the blockchain
Computer-readable media, systems and methods may improve security, authorization, and auditability of documents. For example, computer systems for serving documents may be improved to provide secure access and control through challenges that are validated with self-executing on-chain document license contracts that enforce entitlements that specify users and their authorized document actions. Such entitlements may be generated by the user who created the document. As such, a user may retain over authorizations and document actions that are permissible with respect to the document even after the user has transferred a copy of the document. Furthermore, the computer systems may be improved to write an on-chain audit log of document actions, providing an immutable record of the document actions.
COMPUTING DEVICE VERIFICATION
In response to a trigger event, a challenge message that includes a security code by inputting the security code to a cryptographic program that encrypts the security code based on an authentication key is generated by a first computer. Upon transmitting the challenge message to a second computer, the security code is updated by the first computer based on a random number output from a random number generator. A response is received by the first computer from the second computer in response to the challenge message. Upon verifying the second computer based on the response, a security message including the updated security code is transmitted from the first computer to the second computer.
Authenticate a first device based on a push message to a second device
Examples disclosed herein describe authenticating a first electronic device based on a push message to a second electronic device. In one implementation, a processor receives a user identifier from a first electronic device. The processor may select a message communication type based on the user identifier and transmit an authentication information request to a second electronic device using a push message communication of the selected message communication type. The processor may authenticate the user based on the received response to the request and transmit information related to the user authentication to the first electronic device.