G06F2221/2139

Systems and methods for passive continuous session authentication
11695759 · 2023-07-04 · ·

Systems, apparatuses, methods, and computer program products are disclosed for generating behavioral attribute data structures. An example method includes generating, by video monitoring circuitry, a video data structure comprising a video stream captured over a duration of time, wherein the video stream comprises a plurality of video frames, extracting, by biometric attribute generation circuitry, a set of biometric attributes from the video stream, generating, by biometric attribute generation circuitry, a biometric attribute data structure comprising the set of biometric attributes extracted from the video data structure, generating, by sensor circuitry, a sensor data structure comprising a set of sensor data captured over the duration of time, and generating, by behavioral attribute generation circuitry, a behavioral attribute data structure from the sensor data structure and the biometric attribute data structure, wherein the behavioral attribute data structure comprises a set of behavioral attributes of the user derived from the set of sensor data.

SYSTEM AND METHODS FOR USING ENHANCED QR CODES IN A CALL TO ACTION
20220414698 · 2022-12-29 ·

A system and method for using enhanced QR codes in a call to action, that provides enhanced functionality for generating a call to action element or providing personalized content when scanned, and that combine additional data dimensions with existing QR code technologies to expand the QR code capability beyond what is enabled by standard QR code specifications.

Authentication system and method

In accordance with aspects of the inventive concepts, a system and method provide ongoing authentication through processing of data that includes biometric data. Such systems and methods can use, as examples, face recognition and/or voice biometric data, or other biometric data, to identify the user in real-time and thereafter during an ongoing session. In various embodiments, the system can continuously or repeatedly authenticate one or more users using biometric data to control access to information and/or functions in real (or near real) time. The system can be configured to optimize and/or minimize resource consumption associated with the ongoing authentication process.

ENHANCING VERIFICATION IN MOBILE DEVICES USING MODEL BASED ON USER INTERACTION HISTORY
20220405358 · 2022-12-22 ·

User verification using a mobile interaction can include receiving interaction data associated with a user of an application operating on a mobile device, the interaction data is generated during an interactive session of the user with the application on the mobile device. A plurality of features are extracted from the interaction data and one or more feature vectors are generated from the plurality of features. The plurality of features are aggregated to the one or more feature vectors and embedded within each feature vector. The embedded plurality of features are then projected to a global feature space by comparing a history of interactive sessions associated with the user and a history of interactive sessions associated with a plurality of different users for generating a global training dataset. Finally, a verification model is generated as a global binary classification model using the global training dataset.

AUTHENTICATION POLICY FOR EDITING INPUTS TO USER-CREATED CONTENT

One embodiment provides a method, including: identifying, at an information handling device, a sensitivity level associated with user-created content; detecting editing input provided to the user-created content by a user; determining, using a processor, a type of continuous authentication policy to implement for the user-created content based upon the sensitivity level; and authenticating the user providing the editing input at a frequency dictated by the type of the continuous authentication policy. Other aspects are described and claimed.

Notification Prompt Method, Server, and Storage Medium
20220398334 · 2022-12-15 ·

This application provides a notification prompt method, a server, and a storage medium. The method includes: when a notification is received, determining a target terminal that meets a preset notification prompt condition from terminal devices on which an account of a target user is logged in; obtaining identity information of a user currently using the target terminal; and when detecting, based on the identity information, that only the target user is currently using the target terminal, controlling the target terminal to prompt the notification in a first prompt mode, where preview content of the notification is displayed in the first prompt mode; or when detecting, based on the identity information, that a plurality of users are currently using the target terminal, controlling the target terminal to prompt the notification in a second prompt mode, where preview content of the notification is not displayed in the second prompt mode.

SYSTEM FOR IMPLEMENTING CONTINUOUS AUTHENTICATION BASED ON OBJECT LOCATION RECOGNITION
20220398301 · 2022-12-15 · ·

Systems, computer program products, and methods are described herein for implementing continuous authentication based on object location recognition. The present invention is configured to receive, from the computing device of a user, a request for primary authorized access; receive, via the augmented reality application, a real-time visual feed, wherein the real-time visual feed comprises one or more objects; determine one or more positional parameters associated with the one or more objects; determine that the one or more objects and the one or more positional parameters associated with the one or more objects meets one or more requirements for the primary authorized access; and transmit control signals configured to cause the computing device of the user to display a notification indicating that the user has been granted the primary authorized access.

Secure nonscheduled video visitation system
11528450 · 2022-12-13 · ·

Described are methods and systems in which the censorship and supervision tasks normally performed by secured facility personnel are augmented or automated entirely by a Secure Nonscheduled Video Visitation System. In embodiments, the Secure Nonscheduled Video Visitation System performs voice biometrics, speech recognition, non-verbal audio classification, fingerprint and other biometric authentication, image object classification, facial recognition, body joint location determination analysis, and/or optical character recognition on the video visitation data. The Secure Nonscheduled Video Visitation utilizes these various analysis techniques in concert to determine if all rules and regulations enforced by the jurisdiction operation the secured facility are being followed by the parties to the video visitation session.

MULTI-RECIPIENT SECURE COMMUNICATION
20220376926 · 2022-11-24 ·

This disclosure relates to data security and cryptography. In one aspect, a method includes receiving, by a recipient device and from a client device, a communication including an attestation token and attachment elements. The attestation token includes a set of data and a digital signature of the set of data. Each attachment element includes recipient data for a respective recipient of the communication and a binding that cryptographically binds the attachment element to the attestation token. The recipient device verifies integrity of the communication using the attestation token and a given attachment element for the given recipient. The verification includes verifying integrity of the given attachment element, including determining, based on the binding of the given attachment element, that the attachment element is bound to the attestation token. Verifying the integrity of the attestation token includes determining, based on the set of data, that the digital signature is valid.

Database access, monitoring, and control system and method for reacting to suspicious database activities
11593505 · 2023-02-28 · ·

A database access, monitoring, and control system and method monitor database access, detect suspicious database activities, and react to suspicious database activities by initiating one or more control functions. In at least one embodiment, suspicious database activities include activities related to a number of rows of data retrieved in response to one or more queries within a predetermined threshold window of time. Data retrieval row count above a predetermined threshold that represents an anticipated maximum request for legitimate users can indicate a suspicious database activity. In at least one embodiment, the database access, monitoring, and control system and method detects suspicious database activities even if a data requestor has thwarted other security measures or if the data requestor has authorized access but is potentially accessing data inappropriately.