Patent classifications
G06F2221/2117
Vehicle electronic device for performing authentication, mobile device used for vehicle authentication, vehicle authentication system, and vehicle authentication method
According to certain embodiments, a vehicle electronic device comprises a transceiver configured to communicate with a mobile device; and at least one processor configured to generate first authentication information, control the transceiver to transmit the first authentication information to a registered mobile device, control the transceiver to send a request for authentication to the mobile device via a first communication connection, and perform authentication based on whether or not the processor receives second authentication information from the mobile device that corresponds to the first authentication information, wherein the first communication connection directly communicates with the mobile device.
Device locator disable authentication
A device locator mode or find my device (FMD) mode can allow a lost, stolen, or misplaced mobile device to be located. The FMD mode can be enabled or disabled on a mobile device. Sometimes thieves or unauthorized parties attempt to disable the FMD mode. To prevent this, the mobile device can transmit a unique device identifier to a remote server. The remote server can link the device identifier to a cloud-based user account associated with the user of the mobile device. Before an FMD mode is disabled on the mobile device, before the content or settings can be erased, and/or before a mobile device is permitted to be activated/reactivated, a user of the mobile device can be challenged for the credentials of the cloud-based user account. If valid credentials are provided, FMD can be disabled, the content or settings can be reset, and/or the device can be activated/reactivated.
USER INTERFACES FOR AUTHENTICATING TO PERFORM SECURE OPERATIONS
The present disclosure generally relates to methods and user interfaces for authentication, including providing authentication at a computer system in accordance with some embodiments.
DAY ZERO USER ACCESS TO ENTERPRISE RESOURCES
Disclosed are various approaches for providing touchless visitor management. A visitor can complete a visitor registration process using a client device of the visitor and obtain a virtual badge credential to a visitor's device. A physical access control system credential as well as a visitor badge can also be obtained to the visitor's device.
Method for detecting intrusions in an audit log
A method detects intrusions in an audit log including records of user sessions with activity features and a user label of a claimed user of the user session. Probabilities that a user session belongs to a user are predicted. A probability is predicted for each combination of a user and a user session of the audit log based on the activity features of the user sessions. A user group including users with similar activity features is constructed based on the predicted probabilities. An anomaly score for a user session of the audit log and a claimed user of the user session belonging to the user group is determined based on a probability that the user session belongs to the user group. An intrusion is detected if the anomaly score of the user session and the claimed user exceeds a predetermined threshold.
INFORMATION PROVISION METHOD
An information provision method includes accumulating, in a first database, a first identifier identifying each of one or more service providers, and first device information indicating an electrical device to be designated by each of the one or more service providers in association with each other; accumulating, in a second database, a second identifier identifying each of one or more users, and second device information indicating an electrical device to be used by the one or more users in association with each other; extracting a service provider associated with the first device information when the second device information is updated by addition of a new electrical device to be used by one of the one or more users, and when the new electrical device is included in the electrical devices indicated by the first device information.
INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM
According to this disclosure, there is provided an information processing apparatus including: an acquisition unit that acquires, from a subject to be registered, a plurality of biometric information whose type differ from each other; a specifying unit that specifies, based on features of each of the plurality of biometric information, a category to which each of the plurality of the biometric information belongs, among a plurality of categories set for each of the types; and a registration unit that registers, in the storage area in association with each of the subjects to be registered, the plurality of biometric information and the categories to which the plurality of biometric information belong respectively.
Creating and Using Device Orientation Fingerprints
Creating and using device orientation fingerprints can include detecting a request to create an orientation fingerprint for a user device, where the orientation fingerprint defines an orientation of the user device and includes a machine learning model that models, for the user device and a known user of the user device, multiple orientations of the device for multiple activities. Operational data that includes orientation data, identity data, and activity data can be obtained. The operational data can be provided to machine learning to output the orientation fingerprint and the orientation fingerprint can be stored with data that associates the orientation fingerprint with the known user.
SYSTEM AND METHOD FOR SECURE CODE SCANNING
Graphical codes, such as Quick Response (QR) codes, are commonly used for convenient acquisition by a mobile device of a text string (e.g., a Uniform Resource Locator identifying a website) or other data word. Such an acquisition, however, may be a relatively low-security operation because of the relative ease with which such graphical codes may be produced. As such, a system and method for secure code scanning and verification are provided.
Visual image authentication
Methods and systems described herein authenticate a user and help secure transaction. A display screen presents images that are difficult for malware to recognize but a person can recognize. In at least one embodiment, a person communicates transaction information using visual images received from the service provider system. In at least one embodiment, a user selects a sequence of visual images as a means of authenticating the user and logging into a financial account or other corporate account. In some embodiments, methods and systems are provided for determining whether to grant access, by generating and displaying visual images on a screen that the user can recognize, and select. In an embodiment, a user presses his or her finger or fingers on a display screen to select images as a method for authenticating and protecting communication from malware. In an embodiment, non-determinism in hardware helps unpredictably vary the image selected, the image location, generate noise in the image, or change the shape or texture of the image. In some embodiments, visual image authentication helps Alice and Bob detect if Eve has launched a man-in-the-middle attack on their key exchange.