G06F2221/2115

Identity Verification Method and Apparatus, and Electronic Device
20230091160 · 2023-03-23 ·

A method and device for identity verification is provided. The method includes receiving a screen projection operation performed by a user to project a screen of a first electronic device onto a second electronic device, collecting, first identity verification information of the user in response to the screen projection operation, obtaining a first comparison result between the first identity verification information and second identity verification information pre-stored in the first electronic device, and displaying based on the first comparison result being consistent, a screen projection interface of the first electronic device, receiving an unlock operation performed by the user, collecting third identity verification information of the user, obtaining a second comparison result between the third identity verification information and the second identity verification information, and displaying or not displaying content based on the result of the identity verification.

FACE IMAGE VERIFICATION METHOD AND APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM
20230091865 · 2023-03-23 ·

Embodiments of this application provide a face image verification method performed by an electronic device, and a storage medium. In the embodiments of this application, a face image transmitted by a target device is received; then a residual fingerprint of the face image is extracted; then the device fingerprint information corresponding to the target device is obtained from a fingerprint information library, the fingerprint information library containing device fingerprint information corresponding to at least one verified device; then a device fingerprint component corresponding to the residual fingerprint information is obtained from the device fingerprint information according to position indication information of the face image, and a degree of correlation between the residual fingerprint information and the device fingerprint component is calculated; and when the degree of correlation is greater than or equal to the preset threshold, it is determined that the face image passes verification.

DYNAMIC SECURITY CODE

A system and method are disclosed for determining when to update and updating dynamic security codes. A user's payment information (e.g., credit card information) includes a dynamic security code that may be updated after a threshold amount of time passes or after successful transactions made using the dynamic security code. The time at which an update is made may be used to generate the updated dynamic security code. A user may specify a dynamic security code associated with the user's payment information (e.g., credit card information) while requesting a transaction be made with the user's credit card. A record of previously generated dynamic security codes is maintained. The transaction may be authorized based on whether the user-specified dynamic security code matches any of the current or previously generated dynamic security codes.

Multi-party secure information integration system
11610016 · 2023-03-21 · ·

A method of the present disclosure includes a host system authenticating a user of the user device to access secure host information associated with the user in a database. A request may be transmitted to a third-party system to access secure third-party information stored by the third party based on third-party authentication information. The host system may receive the secure third-party information and store the secure third-party information in a memory location of the database that is associated with a different memory location including the secure host information. The memory location and the different memory location may be associated in the database based on a common information type. The host system may generate a graphical user interface that positions the secure host information and the secure third-party information in the graphical user interface based on their respective location in the database.

Threat mitigation system and method

A computer-implemented method, computer program product and computing system for: obtaining consolidated platform information for a computing platform to identify one or more deployed security-relevant subsystems; processing the consolidated platform information to identify one or more non-deployed security-relevant subsystems; generating a list of ranked & recommended security-relevant subsystems that ranks the one or more non-deployed security-relevant subsystems; and providing the list of ranked & recommended security-relevant subsystems to a third-party.

Social account recovery

Systems and methods are provided for performing operations including: receiving, via a messaging application of a user device, a request to recover access to an account of a user of the messaging application; accessing a first object corresponding to a first key; receiving, from a first friend of the user on the messaging application, a second object corresponding to a first portion of a second key; receiving, from a second friend of the user on the messaging application, a third object corresponding to a second portion of the second key; deriving the second key based on the second and third objects; and recovering access to the account of the user based on the first key and the second key.

System and method for machine learning model determination and malware identification

A system and method for batched, supervised, in-situ machine learning classifier retraining for malware identification and model heterogeneity. The method produces a parent classifier model in one location and providing it to one or more in-situ retraining system or systems in a different location or locations, adjudicates the class determination of the parent classifier over the plurality of the samples evaluated by the in-situ retraining system or systems, determines a minimum number of adjudicated samples required to initiate the in-situ retraining process, creates a new training and test set using samples from one or more in-situ systems, blends a feature vector representation of the in-situ training and test sets with a feature vector representation of the parent training and test sets, conducts machine learning over the blended training set, evaluates the new and parent models using the blended test set and additional unlabeled samples, and elects whether to replace the parent classifier with the retrained version.

Continuous vulnerability management for modern applications

Apparatuses, methods, and systems are provided for making continuous vulnerability management for modern applications. A dependency tree can be created mapping third-party libraries to microservices used in an application of a software package. Natural language processing can be used on release notes and changelogs of new library versions to generate a list of libraries afflicted with common vulnerabilities and exposures (“CVEs”). A number of code calls from an application program interface (“API”) can be made to an afflicted library. A number of code calls including CVEs can be enumerated for each afflicted library. A risk score can be assigned to the API based on the number of code calls including CVEs. The risk score can be compared against a threshold value to cause a remedial action to occur, including updating libraries to newer versions to resolve CVE issues or generating a report regarding the afflicted libraries.

AUTOMATION OF WORKLOADS INVOLVING APPLICATIONS EMPLOYING MULTI-FACTOR AUTHENTICATION
20230082185 · 2023-03-16 ·

A robotic process automation (RPA) system provides bots that interact with and provide user credentials to applications, such as for multi-factor authentication (MFA). First user credentials associated with MFA are retrieved by the bots from credential storage. Second user credentials that correspond to questions posed to a user of an application are retrieved from credential storage. Second user credentials that correspond to a one-time password are generated by the RPA system. The second user credentials may also be generated by a third-party authentication service that provides the credentials via a secondary channel such as email or SMS, which are then retrieved for presentation to the application.

Pharmaceutical transport system including RFID based lock operation and related methods

A pharmaceutical transport system may include an authentication server for storing authorized user identifications (IDs), and a pharmaceutical transport device movable within a pneumatic network. The transport device may include a container, a radio frequency identification (RFID) reader configured to obtain a user identification (ID) based upon a user RFID transmitter being presented adjacent thereto, and wireless communications circuitry to wirelessly communicate the obtained user ID to the authentication server. The pharmaceutical transport device may also include an electronic lock configured to unlock the container responsive to an unlock command via the wireless communications circuitry and from the authentication server based upon a match between the obtained user ID and one of the plurality of authorized user IDs.