G06F2221/2133

Verification Method, Electronic Device, and Non-Transitory Computer-Readable Storage Medium
20220414192 · 2022-12-29 ·

A verification method, includes: in a case that the first operation does not meet a verification condition, adjusting a current value of a first sub-region in the verification region, or increasing an area of the first sub-region in the verification region, or adjusting a current value of a second sub-region in the verification region. The verification region includes the first sub-region and the second sub-region, and after the current value of the first sub-region or the current value of the second sub-region is adjusted, the current value of the first sub-region is greater than the current value of the second sub-region.

Detecting Separate Login During Action Based Knowledge-Based Authentication and Disqualifying Validity

Aspects described herein may relate to techniques for detecting login activity to a financial account during a knowledge-based authentication process. The login activity may be related to access to an online interface for the financial account. The detection of login activity during the authentication process my indicate that the integrity of the authentication process is compromised as login access may provide an individual with transaction data that may be used to answer transaction-based authentication questions. As a result of detecting login activity, an alternative authentication process may be initiated or an authentication request related to the financial account may be denied.

SYSTEMS AND METHODS FOR SECURE ADAPTIVE ILLUSTRATIONS
20220414193 · 2022-12-29 ·

Systems and methods for adaptive verification may include a memory and a processor. The memory may be configured to store a plurality of animation templates. The processor may be configured to perform a first challenge process to request a first user image from a first predetermined distance, receive the first user image, request a second user image from a second predetermined distance, receive the second user image, transmit the first user image and the second user image for a verification process, the verification process including identification of one or more user attributes, receive a third user image associated with the one or more user attributes identified during the verification, and display the third user image including an adaptation, wherein the adaptation is generated for at least one of the plurality of animation templates, the adaptation illustrating the one or more user attributes.

User verification systems and methods
11539713 · 2022-12-27 ·

This disclosure relates to systems and methods for verifying the presentation of content to a target audience using generated metrics indicative of a likelihood that the content was presented to actual human individuals within the target audience. In some instances, such a metric may be associated with a probability model estimating that a user (e.g., a user of a device) is human and not a bot and/or other automated service. Metrics consistent with aspects of the disclosed embodiments may be generated based, at least in part, on user information received from a user and/or associated devices and/or associated services. Consistent with various disclosed embodiments, metrics indicative of whether a user is human, content distribution decisions and user agency decisions may use such metrics.

Transport related n-factor authentication

An example operation includes one or more of determining, via a transport, that a person seeks access to the transport, visually indicating, via the transport, an action for the person to perform, receiving, via the transport, the action and validating, via the transport, that the person is associated with the transport, based on the receiving.

SYSTEMS AND METHODS FOR CLIENT-SIDE IDENTITY VERIFICATION
20220407853 · 2022-12-22 ·

A computer-implemented method for client-side identity verification may include (1) receiving, via an endpoint computing device, input from a user that includes biometric data of the user captured by a sensor of the endpoint computing device and visual data of a physical identification document that includes a record of the biometric data, (2) verifying, by the endpoint computing device, that the biometric data captured by the sensor of the endpoint computing device matches the record of the biometric data in the physical identification document, and (3) transmitting, to a server, a verification that the user has been identified while preventing the biometric data from being included in the verification sent to the server. Various other methods, systems, and computer-readable media are also disclosed.

Access controlling network architectures utilizing novel cellular signaled access control and machine-learning techniques to identify, rank modify and/or control automated programmable entities (such as robots/bots) and their visual schemas, and methods for use thereof
11533619 · 2022-12-20 · ·

In some embodiments, an exemplary access controlling network architecture may include: a computer platform configured to: receive, from an online entity, an action performance request; request, from an access controlling platform, an expected access control digital key to be presented to the online entity; receive the expected access control digital key; instruct to display the expected access control digital key at a computing device; cause a mobile originating communication, having the expected access control digital key and an identity linked to the computing device; determine a lack of a receipt of the access authentication indicator associated with the online entity from the access controlling platform; and perform, due to, for example, the online entity being a BOT, one of: modifying a visual schema of the online entity, disabling the online entity, or suspending one of: a performance of the online entity or the performance of the action by the online entity.

Systems, Methods and Apparatus for Evaluating Status of Computing Device User
20220398476 · 2022-12-15 ·

Methods, systems and apparatus, e.g., non-transitory machine readable medium having stored thereon instructions, for providing a value indicating a judgment of whether a human or an autonomic computer application operating a client computer is interacting with a server, by operations comprising: receive data from the client computer including active data relating to interactions of the client computer with a website of the server and passive data of the client computer; analyze received data from the client computer for indication of a human operating the client computer, wherein the analyzing includes analyzing the received data in conjunction with model data based on human interactions from a prior session with the same website and developing a first analysis value; and provide a request for further data from the client computer when the first analysis value fails to meet the first analysis predetermined criteria.

Authentication control device, authentication control method, and authentication method
11526594 · 2022-12-13 · ·

In one aspect, the provided is an authentication control device including: receiving means for receiving an input associated with at least one position among a plurality of positions that are included in an authentication image causing a viewer to perceive depth and are at different apparent depths; and determination means for determining, based on the input, whether or not the input is made by a human.

Login and authentication methods and systems

Systems, methods, and apparatuses for authenticating requests to access one or more accounts over a network using authenticity evaluations of two or more automated decision engines are discussed. A login request for access to a user account may be submitted to multiple decision engines that each apply different rulesets for authenticating the login request, and output an evaluation of the authenticity of the login request. Based on evaluations from multiple automated decision engines, the login request may be allowed to proceed to validation of user identity and, if user identity is validated, access to the user account may be authorized. Based on the evaluations, the login attempt may also be rejected. One or more additional challenge question may be returned to the computing device used to request account access, and the login request allowed to proceed to validation of identity if the response to the challenge question is deemed acceptable.