G06F2221/2139

Continuously validating a user during an established authenticated session using photoplethysmogram and accelerometer data

Embodiments herein provide a method and system for continuously validating a user during an established authenticated session using Photoplethysmogram (PPG) and accelerometer data. State of the art approaches are mostly based on feature extraction and ML modelling for PPG based continuous session validation, while a template based approach in the art follows a complicated approach. The method disclosed herein utilizes less computation intensive template based approach to continuously validate the user across the session. The method comprises preprocessing a PPG data or PPG signal acquired from a wearable device worn by the user to identify segments of negligible motion. A first segment, after authentication using conventional authentication mechanism, serves as the initial reference. The chosen segments are then tested one by one with respect to the reference. If the templates in a segment match those of the reference, it is updated as the new reference, else a re-authentication is triggered.

Using Continuous Biometric Information Monitoring For Security

Measurements of biometric information of a user are obtained over time, such as blood glucose measurements. These biometric measurements are typically obtained by a wearable biometric information monitoring device being worn by the user. These biometric measurements are used by various different systems, such as a computing device of the user or a biometric information monitoring platform that receives biometric measurements from multiple different users. The biometric measurements are used for various security aspects, such as one or more of part of multi-factor authentication of the user, generating security keys (e.g., connection keys, encryption keys), identifying biometric measurements associated with different user identifiers but the same use, and protecting biometric measurements so as to be retrievable only by a recipient associated with an additional computing device, and so forth.

Information processing apparatus, control method for information processing apparatus, and storage medium
11586723 · 2023-02-21 · ·

An information processing apparatus in which a plurality of applications operate is provided. The apparatus comprises a verification unit that verifies whether or not an application can be trusted; and a controller that controls the application, wherein during the execution of a first application executed in response to a user instruction, the controller causes the verification unit to verify a second application that the first application dynamically imports, before the second application is loaded.

Policy controlled remote operating system (OS) authorization based on automatically entered administrative credential
11586769 · 2023-02-21 · ·

An automatically predetermined credential system for a remote administrative operating system (OS) authorization and policy control is disclosed. Administrative activities are packaged in single-use downloaded software program. When executed, the administrative access to the OS is activated before completing the administrative activities. The single-use downloaded software program has policies that performs checks on a user computer executing the software program. The policies include checking firewall settings, confirming virus checking, interrogating software to confirm patches or updates have been performed, checking for key loggers or other surveillance software or devices The single-use downloaded software is protected with a passcode to prevent activation in an unauthorized way.

Information Content Viewing Method and Terminal
20230039353 · 2023-02-09 ·

An information content viewing method includes displaying, by a terminal, a first lock screen or keeps in a screen-off state, and displaying, by the terminal, a second lock screen after receiving first information, where the second lock screen displays a first control, and the first control prompts that content of the first information is hidden, receiving, by the terminal, a first operation of a user on a touchscreen, and collecting and verifying, by the terminal, fingerprint information of the user based on the first operation and displaying, by the terminal, a third lock screen after the verification on the fingerprint information succeeds, where the third lock screen displays the first control, and the first control displays the content of the first information.

Voice activated authentication

Systems and methods provide voice activated authentication over time. A user can be registered with a voice authentication system based on a voiceprint profile of common words. This user voiceprint profile can be used in an ongoing secondary authentication as a hands-free head-mounted wearable device is used over time. Upon a user logging into a hands-free head-mounted wearable device voiceprints can be collected during a session. These collected voiceprints can be compared with a user voiceprint profile for a user authorized to operate the hands-free head-mounted wearable device. Such a comparison can include an analysis of frequency, duration, and amplitude for the voiceprints. When the voiceprints match, the login of the user can be maintained based on this secondary authentication using the voiceprints matched to the user voiceprint profile.

User Movement Detection for Verifying Trust Between Computing Devices
20230100854 · 2023-03-30 ·

Systems and methods for managing interactive object input are disclosed. An interactive object can include sensors configured to generate sensor data indicative of movement associated with a user of the interactive object. Movement data can be analyzed to detect an attachment of a user to the interactive object and/or a separation of a user from the interactive object. State data indicative of a state of the interactive object relative to the user device can be generated in response detecting a separation of a user from the interactive object. The user device can be disabled, based on the state data, from initiating one or more functions in response to input received at the interactive object.

Automated ID proofing using a random multitude of real-time behavioral biometric samplings
11574045 · 2023-02-07 · ·

A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.

AUTHENTICATION APPARATUS, AUTHENTICATION METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM FOR STORING AUTHENTICATION PROGRAM
20230030610 · 2023-02-02 · ·

An authentication apparatus of acquiring an image; performing face detection of the image; collating, for each face region obtained by the face detection, a feature amount of the face region with a feature amount of a face of a legitimate user included in predetermined registration data; presenting, in a case where the face region obtained by the face detection includes the face of the legitimate user and a face of a third party other than the legitimate user, an aiming frame with which aim of capturing of an image of the face of the legitimate user is to be aligned on the image; and continuing continuous authentication after logon in a case where a degree of matching between the face region detected by the face detection and the aiming frame satisfies a predetermined condition.

Device authentication system and method
11617080 · 2023-03-28 ·

There is a system for controlling access to an electronic device. This system can comprise at least one server having at least one microprocessor. There can be at least one remote device having at least one microprocessor, and at least one GPS location device, wherein the one remote device is configured to communicate a location of the at least one remote device. This remote device further comprises any one of at least one transceiver configured to communicate wirelessly, at least one biometric reader configured to read a biometric of a user and/or at least one hardware reader configured to read an identification piece. Thus, the electronic device is selectively unlocked via either an internal lock or via the server authenticating a location of the remote device, a Wifi signal of the remote device, a biometric reading of the remote device and a reading of the hardware reader of the remote device.