Patent classifications
G06F2221/2103
Continuous authentication system and related methods
A continuous authentication system and related methods are provided. The system detects requests to perform user actions. A security value is associated with each user action. The system determines a subsequent session security level in response to an adjustment to a session security level by a security value of a requested user action. The requested user action is permitted and the session security level is adjusted based on the security value of the requested user action in response to a determination by the system that the subsequent session security level is greater than or equal to a threshold session security level. A user authentication challenge is caused (e.g., prompted) in response to a determination by the system that the subsequent session security level is less than the threshold session security level. The requested user action is permitted and the session security level is adjusted based on the security value of the requested user action in response to a successful user authentication challenge. The requested user action is rejected in response to an unsuccessful user authentication challenge.
Inter-die memory-bus transaction in a seamlessly integrated microcontroller chip
Techniques in electronic systems, such as in systems comprising a CPU die and one or more external mixed-mode (analog) chips, may provide improvements advantages in one or more of system design, performance, cost, efficiency and programmability. In one embodiment, the CPU die comprises at least one microcontroller CPU and circuitry enabling the at least one CPU to have a full and transparent connectivity to an analog chip as if they are designed as a single chip microcontroller, while the interface design between the two is extremely efficient and with limited in number of wires, yet may provide improved performance without impact to functionality or the software model.
Remoting user credential information to a remote browser
A computing system includes a virtual server to provide a virtual computing session, and a client device to access the virtual computing session via a communications network. The virtual computing session includes a remote browser, and the client device includes a local browser to access user credential information. The remote browser is used to navigate to a website requiring user authentication, receive a user credential challenge from the website, and request the user credential information from the client device to satisfy the user credential challenge. The client device provides the user credential information to the remote browser for user authentication via the local browser, so as to satisfy the user credential challenge of the website.
Interactive electronic content delivery in coordination with rapid decoding of brain activity
A method and system for providing a user with virtual objects within an environment, characterizing interactions with the virtual objects using a brain computer interface, and modulating features of the virtual objects based upon improved classifiers associated with the interactions. The method and system can be used to rapidly customize virtual objects to a specific user in applications related to increasing engagement with traditional and new media content, virtual and augmented reality products, streamlining interactions with input devices in digital and physical environments, providing user authentication tools, providing more secure cybersecurity features, and delivering tailored content to users.
RtCaptcha: a real-time captcha based liveness detection system
Example systems and methods for defending against powerful, automated attacks on facial authentication systems are disclosed. A first verification is performed based at least in part on determining a response time for a response to a CAPTCHA or other challenge. In response to determining that the response time is within a threshold, a second verification is performed based at least in part on extracting a face feature or a voice feature from a plurality of samples associated with the response.
Authentication question topic exclusion based on response hesitation
Methods, systems, and apparatuses are described herein for improving computer authentication processes by analyzing user response times to authentication questions. A request for access to an account may be received. Transaction data associated with a user of that account may be retrieved, and a list of merchants may be generated based on the transaction data. A blocklist may be retrieved, and the list of merchants may be filtered based on the blocklist. An authentication question may be presented. The authentication question may relate to the list of merchants. User responses may be received, and response times for the user responses may be measured. Based on the response times and the response times for other users, an average response time for the merchants may be determined. Based on the average response time for a particular merchant exceeding a threshold, the particular merchant may be added to the blocklist.
AUTHENTICATION-GAINING APPARATUS, AUTHENTICATION APPARATUS, AUTHENTICATION REQUEST TRANSMITTING METHOD, AUTHENTICATION METHOD, AND PROGRAM
An authentication-gaining apparatus includes: an acquiring unit that acquires unique information; an encrypting unit that encrypts the unique information using a cryptographic key, thereby generating encrypted information; and a display unit that repeatedly transmits an authentication request containing the encrypted information, to an authentication apparatus, during an authentication period, wherein multiple authentication requests respectively containing encrypted information obtained by encrypting different pieces of unique information are transmitted during the authentication period. An authentication apparatus includes: a receiving unit that repeatedly receives an authentication request transmitted from an authentication-gaining apparatus, during an authentication period; a decrypting unit that decrypts the encrypted information, thereby acquiring decrypted information; an authentication unit that judges whether or not the authentication-gaining apparatus is legitimate, using multiple authentication requests received during the authentication period and containing encrypted information that has been decrypted; and an output unit that outputs a judgment result by the authentication unit.
System and Method for Serving Subject Access Requests
Systems and methods for serving subject access requests (SARs) are disclosed. A network connection is established with a user. An SAR, including at least one piece of personal data corresponding to an entity associated with said user, is received from the user via the network connection. Text data is extracted from a plurality of data objects, the data objects including personal data associated with the user. The text data is then processed to identify instances of names and instances of personal data within the text data. Associations are generated between identified names and identified personal data. A subset of the identified personal data that corresponds to the entity is identified based on the associations. A response to the SAR is provided, based at least in part on the identified personal data corresponding to the entity.
Method for authenticating a user by user identifier and associated graphical password
Disclosed is a method for authenticating a user by user identifier and associated graphical password. The graphical password includes a sequence of several images belonging to a group of images. The user provides a user identifier to an application, and graphically selects a sequence of several images in this group of images, the image order being randomly displayed by the application with each authentication of the user. The application identifies the position of each selected image in the sequence, establishes the correspondence between the sequence of the positions and the sequence of the identifiers of the selected images, compares the sequence of the selected images identifiers with the registered sequence, the application being the only entity able to establish this correspondence and/or the application being the only entity able to make this comparison, and authenticates the user if the comparison is positive but refuses authentication for negative comparison.
Authentication via a dynamic passphrase
A computerized method for voice authentication of a customer in a self-service system is provided. A request for authentication of the customer is received and the customer is enrolled in the self-service system with a text-independent voice print. A passphrase from a plurality of passphrases to transmit to the customer is determined based on comparing each of the plurality of passphrases to a text-dependent or text-independent voice biometric model. The passphrase is transmitted to the customer, and when the customer responds, an audio stream of the passphrase is received. The customer is authenticated by comparing the audio stream of the passphrase against the text-independent voice print. If the customer is authenticated, then the audio stream of the passphrase and the topic of the passphrase may be stored.