G06F2221/2131

TRANSPORT RELATED N-FACTOR AUTHENTICATION
20210312031 · 2021-10-07 ·

An example operation includes one or more of determining, via a transport, that a person seeks access to the transport, visually indicating, via the transport, an action for the person to perform, receiving, via the transport, the action and validating, via the transport, that the person is associated with the transport, based on the receiving.

Establishing and verifying identity using action sequences while protecting user privacy

A user device can verify a user's identity to a server while protecting user privacy by not sharing personal data with any other device. To ensure user privacy, the user device performs an enrollment process in which the user performs an action sequence. The user device collects action data from the action sequence and uses the action data locally to generate a set of public/private key pairs (or other representation) from which information about the action sequence cannot be extracted. The public keys, but not the underlying action data, are sent to a server to store. To verify user identity, a user device can repeat the collection of action data and the generation of the key pairs. If the device can prove to the server its possession of the private keys to a sufficient degree, the user's identity can be verified.

Methods, computer readable media, and systems for authentication using a text file and a one-time password

Methods, systems, and computer readable media for authentication using a text file and a one-time password are described. A method includes receiving user credentials and providing initial text for modification then generating first and second hash values based on a hash function of the initial and modified texts, and comparing the hash values and creating a record in a user table to store information corresponding to the user including the second hash value, wherein the information includes the modified text if the texts do not match; then sending a user a first one-time password via email to verify that the user is an owner of an email address provided by the user.

WEB APPLICATION USER IDENTIFICATION BY LIMITED SELF-RECOGNITION
20210297401 · 2021-09-23 ·

A system and method for provides unverified users an ability to act upon private records known to them while protecting user privacy by not reflecting private information back to the unverified user. As an unverified user inputs information related to their identity into an interface, the system searches an indexed database which may include both registered users and/or unregistered customers indexed from a single data source or from disparate data sources.

MESSAGING SYSTEMS AND METHODS

A messaging system may include an account module that maintains user accounts associated with user identifying data that include a first password required to access the user account. The messaging system may receive message data including a message and identification of one or more of the user accounts the message is to be shared. Upon request, the messaging system may issue a second password to one of the user accounts. When the second password is used to access the user account, the user account may revert to an original state wherein all personalized information, including payment information, associated with the user account is deleted and unrecoverable.

Systems and methods for managing resetting of user online identities or accounts
11108752 · 2021-08-31 · ·

Systems and methods are disclosed for managing the resetting of online identities or accounts of users of Internet web pages. One method includes: receiving, through an electronic device, a request to reset login information to access a web page associated with the user's online account; determining that an IP address associated with the request is not identified as being suspicious; receiving user data intrinsic to the user's request; automatically verifying two or more values of the data intrinsic to the user's request as being indicative of a level of trust of the identity of the user; and transmitting, to the user over the Internet, a subset of options to reset the login information, the subset being selected based on the level of trust.

Device and method of setting or removing security on content

A device for removing security on content using biometric information includes a memory configured to store content on which security has been set based on first biometric information of a user; and a controller configured to obtain second biometric information of the user, which is of a different type than the first biometric information, and remove the security on the content based on the second biometric information, in response to a user input for executing the content.

METHOD AND NETWORK NODE FOR MANAGING ACCESS TO A BLOCKCHAIN

A method and a network node for managing access, by a device, to a blockchain. The network node receives, a first request for creation of a first account. The first request includes information relating to a user of the device and a first hash value. The network node creates, based on the information and the first hash value, the first account on the blockchain, whereby a first address is obtained. The network node receives, a second request for recovering account information of the first account. The second request includes the first address of the first account, a source value from which the first hash value is derived and a second address of a second account. The network node generates a second hash value based on the source value. The network node initiates transfer of the account information of the first account to the second account.

Systems and methods for data access control using narrative authentication questions

A system and method for data access control using narrative authentication questions can include a server containing a database storing login credentials for an account associated with a user, and the login credentials can include a narrative authentication question and an authentication response associated with the narrative authentication question. A system and method for data access control using narrative authentication questions can include a user device in data communication with the server, and the user device can receive and transmit user input from the user. Upon receipt of a request to access the account from the user, the server can transmit the narrative authentication question to the user device, receive a user input by the user transmitted from the user device in response to the narrative authentication question, compare the user input to the authentication response stored in the database, calculate a similarity score based on the comparison, and approve the user's request to access the account if the similarity score exceeds a threshold.

Methods and systems for creating and recovering accounts using dynamic passwords
11082221 · 2021-08-03 · ·

A method for recovering data. Identity factors are collected at a device, wherein hashes of the identity factors are configured to be stored at a server. A dynamic password is generated at the device based on the identity factors and a Salt generated by the server and configured to be delivered to the device. A selfie is captured of a user. The device generates a symmetric key used to encrypt the selfie. The symmetric key is encrypted using the dynamic password. The encrypted symmetric key and the encrypted selfie are stored on the server. One or more data items are stored on the server. The dynamic password is recoverable by presenting the plurality of identity factors that are hashed to the server. The symmetric key is recoverable using the recovered dynamic password. The data items are recoverable by presenting the symmetric key and a second selfie of the user.