Patent classifications
G06F2221/2111
FRAUD DETECTION SYSTEM, FRAUD DETECTION DEVICE, FRAUD DETECTION METHOD, AND PROGRAM
A fraud detection system for executing predetermined processing when a detection target is detected by using a detection device, the fraud detection system comprising at least one processor which determines, before the detection target is detected, whether a predetermined action has been performed by a user having a user terminal; executes, when it is determined that the predetermined action has been performed, fraud detection on the user based on identification information stored in the user terminal; and executes, when the detection target is detected, the predetermined processing based on an execution result of the fraud detection.
SYSTEMS AND METHODS FOR MANAGING ACCESS TO DATA BASED ON A GEOGRAPHIC LOCATION REQUIREMENT
Systems and methods for managing access to data based on a geographic location requirement are disclosed herein. According to an aspect, a system includes a first computing device comprising a data storage manager configured to manage access to stored data based on one or more predetermined rule(s) that specifies geographic location requirement(s) for permissible access to the stored data. The manager is also configured to receive, from a second computing device, a request to access the data. Further, the manager is configured to determine a geographic location of the second computing device, determine whether the geographic location of the second computing device meets the geographic location requirement(s), and permit or deny access to the stored data by the second computing device in response to determining that the geographic location of the second computing device meets the geographic location requirement(s). Furthermore, the geographic location of the client is dynamically tracked to ensure ongoing compliance with the location rule(s), and if at any point the client becomes non-compliant, access to the data is denied and the data stored on the client is deleted by the server.
ENHANCED BIOMETRIC AUTHENTICATION
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for enhancing biometric authentication are disclosed. According to a method, A circumferential biometric template (CBT) of a particular entity is generated based on one or more images of the particular entity. A request to access an item is received wherein the request includes an identifier corresponding to the particular entity. Circumferential biometric data (CBD) for one or more physical characteristics of an entity depicted in an image captured by an image capture device is obtained, Authentication outcome data indicating whether the CBD matches the CBT of the particular entity is generated. Access to the item is granted when the authentication outcome data indicates that the CBD matches the CBT of the particular entity. Access to the item is denied when the authentication outcome data indicates that the CBD fails to match the CBT of the particular entity.
METHOD OF PROVIDING USER-OPTIMIZED LABORATORY ENVIRONMENT
Provided is a method of providing a user-optimized laboratory environment. The method includes receiving user location information and user experiment information from a user terminal, receiving location information of laboratory equipment and internal environment information of a laboratory from a plurality of sensors, providing experiment guide information to a user on the basis of the user location information, the user experiment information, the location information of the laboratory equipment, and the internal environment information of the laboratory, and controlling the laboratory equipment on the basis of the user location information, the user experiment information, the location information of the laboratory equipment, and the internal environment information of the laboratory.
Method for verifying an operator in a security system
The present disclosure relates to a computer implemented method for verifying a computing device and preferably an operator associated with a security system, wherein the security system is specifically adapted for ensuring that the correct security operator is performing the correct task. The present disclosure also relates to a corresponding security system and a computer program product.
Methods and apparatus for automatic permission assignment
This application relates to apparatus and methods for automatically determining and enforcing user permissions for applications and application features. In some embodiments, a system includes a server and a user device. The server may determine a user of the user device based on receiving login credential data. The server may further obtain user attributes for the user including, in some examples, a location of the user. The server may further obtain an attribute-based control policy that identifies relationships between a plurality of possible user attributes. For example, the control policy may identify attribute requirements that must be met for enablement of a particular application feature. Additionally, the server may determine user permissions for the user based on the control policy and the user attributes. The server may transmit the user permissions to the user device, and the user device configures the corresponding application according to the user permissions.
SYSTEM AND METHOD FOR ACCESS CONTROL USING NETWORK VERIFICATION
Systems, methods, and computer program products for controlling access by applications to application data are provided. A computing device receives a request for access control data over a network and returns access control data to the requestor to control an applications access over the network to application data. The access control data returned to the requestor includes access-point dependent access control data to control the application's access to the application data based on the access point used to access the network.
SENSOR-BASED HUMAN AUTHORIZATION EVALUATION
A resource-access management system detects whether a user is authorized to access resources. The system may include a user device being configured to include a sensor that detects sensor data associated with the user. Further, the system includes a client qualification engine that determines whether or not a client is authorized to access the resources by comparing the sensor data with a plurality of patterns for evaluating whether or not the user is an authorized user. User scores are generated based on the compared sensor data and the plurality of patterns. Further, a composite score corresponding to the user is generated using the sensor data, plurality of patterns, and one or more additional criteria. Whether the user is granted access to the resources, presented with unauthorized user tests, or blocked from access to the resources depends on the composite score and threshold values.
SYSTEMS AND METHODS FOR AUTHENTICATION USING RADIO FREQUENCY TAGS
Systems and methods for authentication using radio frequency tags are disclosed. In one embodiment, a method for approving a requested operation from a secondary user of a resource that is controlled by a primary user may include (1) a back end comprising at least one computer processor receiving, from a mobile application that is executed by a mobile device associated with a secondary user, a requested operation involving a resource that is controlled by a primary user; (2) the back end receiving a unique identifier from the secondary user mobile application, the unique identifier being read by the mobile application from a tag associated with the secondary user; (3) the back end determining that the received unique identifier matches a stored unique identifier that is associated with the secondary user; and (4) the back end approving the requested operation and communicating the approval to the secondary user mobile application.
Automated asset criticality assessment
A set of attributes of a particular asset of a computing environment is identified that are determined from data collected by one or more utilities in the computing environment. A criticality rating is automatically determined for the particular asset based at least in part on the set of attributes. A security activity is caused to be performed relating to the particular asset based on the automatically determined criticality rating of the particular asset.