G06F2221/2133

Identity verification system and method for gathering, identifying, authenticating, registering, monitoring, tracking, analyzing, storing, and commercially distributing dynamic biometric markers and personal data via electronic means
11663319 · 2023-05-30 ·

An interactive identity verification system for gathering, identifying, authenticating and registering biometric data of a consumer verified through government agencies while monitoring, tracking, analyzing, storing and distributing dynamic biometric data to ensure access to the secured system remains authorized via monitoring of consumer data and to control authorized access to participating computer systems and programs. Consumer identity is verified with markers gathered from biometric detection and collection devices provided within the system, correlated with unique personal information and geo-location coordinates allowing authorized access to a secure computer system. Dynamic monitoring of consumer biometric data is required to guarantee online identity verification while operating under an alias or avatar to maintain public anonymity, participate in marketing incentive programs and increase security. The system provides for a registered consumer to use multiple registered computer devices while the central repository interfaces dynamically with specific markets to distribute stored data within the system.

USER VERIFICATION SYSTEMS AND METHODS

This disclosure relates to systems and methods for verifying the presentation of content to a target audience using generated metrics indicative of a likelihood that the content was presented to actual human individuals within the target audience. In some instances, such a metric may be associated with a probability model estimating that a user (e.g., a user of a device) is human and not a bot and/or other automated service. Metrics consistent with aspects of the disclosed embodiments may be generated based, at least in part, on user information received from a user and/or associated devices and/or associated services. Consistent with various disclosed embodiments, metrics indicative of whether a user is human, content distribution decisions and user agency decisions may use such metrics

Converting static content items into interactive content items

At least one aspect of the present disclosure is directed to systems and methods of converting static content items into interactive content items. A data processing system can identify a first content item. The data processing system can divide, in accordance with a partition template, the visual content of the first content item into a plurality of segments. The partition template can define a number of segments to be formed from the visual content. The data processing system can generate a second script. The second script can assign each segment into a position. The script can enable movement of each segment within the frame. The script can determine that the segments are moved to a target position. The script can perform an action to provide information related to the visual content. The data processing system can provide the second content item to a client device.

DIGITAL KEY DEVICE AND METHOD FOR ACTIVATING DIGITAL KEY SERVICE
20220337426 · 2022-10-20 ·

A digital key service device includes a casing, an input device, a data storage unit and a controlling unit. The input device is disposed near the casing or mounted on the casing, and configured to receive a user operation input. The data storage unit is disposed in the casing, and configured to store digital data and a digital key. The controlling unit is disposed in the casing, and configured to use the digital key to perform a digital key service or output the digital data to a host when authentication is complete. The authentication includes an operation verification procedure for verifying the user operation input. The authentication is complete when the controlling unit determines that the user operation input conforms to a preset timing-based input set.

VERIFICATION METHOD AND VERIFICATION APPARATUS BASED ON ATTACKING IMAGE STYLE TRANSFER

A verification method and a verification apparatus based on an attacking image style transfer are provided. The method includes the following steps. A style transfer is performed on a verification image for verifying an identity, so as to generate multiple stylized images having at least one style, in which the style transfer includes modifying a local pattern of the verification image while retaining a global pattern of the verification image. At least one of the verification image and the stylized images is processed to add an interference signal having at least one specific pattern for interfering with image recognition. And, the processed stylized images are prompted and a selection operation on the stylized images is received to verify an identity of an object executing the selection operation.

TECHNIQUES FOR INPUT CLASSIFICATION AND RESPONSE USING GENERATIVE NEURAL NETWORKS

Disclosed herein are techniques for detecting invalid web traffic. A method described herein involves obtaining an input sequence. The method further includes inputting the input sequence to an encoder model configured to generate an embedding from the input sequence. The method includes generating, as an output of the encoder model, an embedding. The method includes inputting the embedding to a classifier model configured to predict a vector of probability values corresponding to a plurality of classes using the embedding. A first class of the plurality of classes may be attributed to variable traffic and a second class of the plurality of classes may be attributed to repetitive traffic. The method includes predicting, as an output of the classifier, the vector of probability values. The method includes determining a machine-actor score from the vector of probability values. The method also includes outputting the machine-actor score.

METHODS AND SYSTEMS FOR ACOUSTIC AUTHENTICATION
20230105404 · 2023-04-06 ·

Systems and methods are disclosed for generating an acoustic authentication data entry interface. One method comprises generating a random sequence of characters and a visual user interface element comprising a plurality sections, each section of the visual user interface element being associated with a respective character of the generated random sequence of characters. A section of the visual user interface elements is displayed to a user. Concurrently, an audio recording of a character associated with the displayed section is played to the user. Based on determining user selection of the displayed section, the character associated with the displayed section is logged as part of an authentication data. When all of the characters constituting the authentication data are logged, an electronic transaction authorization request is sent to an acquirer processor.

BOT DETECTION FOR A SURVEY PLATFORM

Aspects and elements of the present disclosure relate to systems and methods for determining whether a user of an application is a bot, the sequences of computer-executable instructions including instructions that instruct at least one processor to assign the user to a user classification of a plurality of user classifications for the application, provide, responsive to assigning the user to the user classification, one or more challenges of a plurality of challenges to the user over multiple instances of the user using the application, each challenge of the plurality of challenges being configured to determine whether the user is a bot, and each challenge being associated with at least one user classification of the plurality of user classifications, and change the user classification based on the user's response to the one or more challenges.

Device validation apparatus and protocol for a group-based communication system

Provided is a computing device of a group based communication system configured to securely validate a client device associated with a group-based communication interface user. An example computing device is configured to identify a validating request transmitted from the client device. If a validating request is identified, the example computing device will transmit a temporary device code to the client device associated with the group-based communication interface user and an e-mail code to an e-mail address associated with a user profile associated with the group-based communication interface user. The example computing device also stores the codes transmitted. The example computing device then receives a confirmation exchange from the client device and determines whether the confirmation exchange satisfies client device validation parameters. If the confirmation exchange satisfies the client device validation parameters, the example computing device will validate the client device by transmitting and storing a long lived device code.

Security verification method and relevant device

The present disclosure provides a security verification method and a relevant device, to increase the difficulty of cracking. The method includes: receiving, from a verification requester, a request for pulling a sliding verification code; acquiring the sliding verification code which includes a slider and a second endpoint image obtained by performing filter processing on a first endpoint image; and returning the sliding verification code to the verification requester. The first endpoint image and the slider are generated from the same original image, and the slider and the second endpoint image are returned to the verification requester finally. The second endpoint image is obtained by performing image processing on the first endpoint image, and after the image processing, in an area outside the slider placement area, pixel values of pixels in the second endpoint image are different from pixel values of corresponding pixels in the original image.