G06F2221/2133

VERIFIED HOSTED INFORMATION IN ONLINE GALLERIES

An apparatus verifies hosted information associated with a user. The apparatus establishes, by the online host serving as a relying party system (RPS), a secure connection between the RPS and a user mobile-identification-credential device (UMD). The RPS sends a mobile identification credential (MIC) user information request to the UMD, via the secure connection, seeking release of MIC user information (official information). The RPS obtains from authorizing party system (APS) verification of the MIC user information received in response to the MIC user information request. The RPS stores the MIC user information as hosted information pertaining to the user. The RPS designates the hosted information as base truth information representing the user.

METHOD AND DEVICE FOR COLLECTING WEBSITE
20230032625 · 2023-02-02 · ·

According to a one embodiment of the present invention, a method for collecting a website in an electronic device includes: step a of accessing a web server corresponding to a Uniform Resource Locator (URL) and receiving a website corresponding to the URL; step b of obtaining a first solution key based on a CAPTCHA solution model when CAPTCHA exists in the website; step c of transmitting the first solution key to the web server and receiving an authentication result; step d of recalculating the first solution key when authentication of the first solution key has failed and transmitting a CAPTCHA resolution request signal to a user terminal when the authentication has failed more than a preset number of times; and step e of receiving a second solution key from the user terminal, transmitting the second solution key to the web server, and crawling the website.

HUMAN-MACHINE VERIFICATION METHOD, DEVICE AND STORAGE MEDIUM

A human-machine verification method and apparatus, a device and a storage medium, relating to the fields of Internet security technologies and computer vision technologies are disclosed. An implementation includes: receiving an identity verification request sent by a requester, and collecting an eyeball gaze point track on an identity verification page, the identity verification request including identity verification information; identifying whether the identity verification information is correct based on pre-stored user identity information; if the identity verification information is correct, performing classification based on the eyeball gaze point track on the identity verification page using a first classification model, and outputting a first probability value indicating whether the requester is a real person or a machine; and determining based on the first probability value that the requester is the real person or the machine, and outputting an identity verification result indicating that identity verification is passed or fails.

INFORMATION COLLECTION APPARATUS, INFORMATION COLLECTING METHOD, AND PROGRAM
20220350909 · 2022-11-03 · ·

In order to efficiently collect web contents that are accessible by answering correct answer character strings, an apparatus includes a collecting unit 111 configured to collect first web content by using web address information, an extracting unit 113 configured to extract, from the first web content, question image information obtained by applying an image effect to a correct answer character string for accessing second web content, and a discriminating unit 115 configured to discriminate the correct answer character string from the question image information, by using a discriminant model associated with the web address information among two or more discriminant models for discriminating a character string from an image.

METHOD AND APPARATUS FOR PROVIDING VERIFICATION

An apparatus, method and computer program is disclosed. The apparatus may comprise means for receiving video data representing a video recording of at least one input made by a user at a user device; receiving audio data representing an audio recording of at least one audio input made by the user at the user device; determining whether there is a correspondence between the at least one input represented in the video data and the at least one audio input represented in the audio data; and providing verification based on the determination.

System and method for assessing authenticity of a communication

Disclosed is a method and system for assessing the authenticity of a communication. The method comprises receiving data of the communication by the processor between one or more participants. Further, extracting one or more features by the processor from the data by using data extraction techniques. Further, comparing the one or more features by the processor with predefined threshold features stored in a feature repository. Further, generating, one or more authenticity attributes by using one or more trained Artificial Intelligence (AI) models applied over the one or more features, along with results of the comparing. Each of the one or more authenticity attributes generates a recommendation output, providing the authenticity of the communication.

SENSOR-BASED HUMAN AUTHORIZATION EVALUATION
20230084647 · 2023-03-16 ·

A resource-access management system detects whether a user is authorized to access resources. The system may include a user device being configured to include a sensor that detects sensor data associated with the user. Further, the system includes a client qualification engine that determines whether or not a client is authorized to access the resources by comparing the sensor data with a plurality of patterns for evaluating whether or not the user is an authorized user. User scores are generated based on the compared sensor data and the plurality of patterns. Further, a composite score corresponding to the user is generated using the sensor data, plurality of patterns, and one or more additional criteria. Whether the user is granted access to the resources, presented with unauthorized user tests, or blocked from access to the resources depends on the composite score and threshold values.

Systems and Techniques for Computer-Enabled Geo-Targeted Product Reservation for Secure and Authenticated Online Reservations

Systems and methods disclosed herein provide a geo-targeted online reservation system that ensures authenticity of customer devices requesting reservations by generating reservations only if threshold authentication conditions are satisfied. For example, a computing device registered with a server system receives inputs for requesting a reservation of a limited release product and for configuring the product. To authenticate the computing device, the server device transmits an electronic message to the computing device requesting the computing device to respond. A response to the message is one threshold authentication condition for generating the reservation. Upon determining that one or more threshold authentication conditions are satisfied, the server device generates a reservation for the product.

Method and system for incorporating marketing in user authentication

A method, system and computing device for incorporating marketing into a user authentication enables valuable marketing information to be received from or provided to users, in an authentication context where the users are likely to be attentive and focused. Thus, marketing information is likely to be thoroughly reviewed by the users, easily recalled by the users at a later time, and user profile data collected from the users is likely to be accurate. The method includes presenting an authentication challenge to a user of a computing device, the authentication challenge including a number of challenge elements; receiving a response to the authentication challenge from the user; and presenting a non-authentication marketing activity to the user, the non-authentication marketing activity including a number of activity elements, and where the activity elements correspond with the challenge elements.

METHOD AND APPARATUS FOR DETECTING, MANAGING ANTENNA PROXIMITY, AND USER PRIVACY BY SHARING RADAR SENSING TELEMETRY
20230127758 · 2023-04-27 · ·

An information handling system may include a processor; a memory; a PMU; a wireless interface adapter for communicating, via a plurality of transceiving antennas operated by one or more radio frequency (RF) subsystems on a plurality of operating wireless links; a monolithic microwave integrated circuit (MMIC radar) to: scan for human presence around the information handling system; scan for human proximity near any of the plurality of transceiving antennas; an antenna controller to receive tagged telemetry data and execute an antenna proximity event algorithm using the tagged telemetry data as input and comparing the human proximity and movement relative to locations of the plurality of transceiving antennas on the information handling system; and an operating system to execute a privacy detect event module to identify a privacy detect event to secure the information handling system.