Patent classifications
G06F21/36
SECURITY VERIFICATION METHOD AND RELEVANT DEVICE
The present disclosure provides a security verification method and a relevant device, to increase the difficulty of cracking. The method includes: receiving, from a verification requester, a request for pulling a sliding verification code; acquiring the sliding verification code which includes a slider and a second endpoint image obtained by performing filter processing on a first endpoint image; and returning the sliding verification code to the verification requester. The first endpoint image and the slider are generated from the same original image, and the slider and the second endpoint image are returned to the verification requester finally. The second endpoint image is obtained by performing image processing on the first endpoint image, and after the image processing, in an area outside the slider placement area, pixel values of pixels in the second endpoint image are different from pixel values of corresponding pixels in the original image.
System and Method for Memetic Authentication and Identification
A method and system are described for controlling access to online applications using memetic authenticators that are de-identified and passwordless. The method includes curating, issuing ownership, and registering memetic authenticators. The method involves assembling an authenticator package including a fingerprint hash value, matched pairs of user-selected memetic authenticator records, a timer, and encrypting the package using a cipher issued and uniquely-assigned by a service provider. Ciphers may be regenerated on each authentication event providing for episodic re-verification. Fingerprints assign ownership for memetic authenticators, with such associations stored on networked nodes of a distributed database. On authenticating, the client-supplied authenticator package is decrypted and compared to ownership records on an identity network for verification and granting or denying access. The method provides for multilateral verification by retrieving ownership claims from multiple nodes during authentication events. At no time does any party to the system possess everything required to authenticate.
Authentication of a Physical Credential
Aspects described herein may provide detection of a physical characteristic of a credential, thereby allowing for authentication of the credential. According to some aspects, these and other benefits may be achieved by detecting the physical characteristic with the credential. An image of a credential may be received. An optical characteristic of a secure feature of the credential may be determined. An expected optical characteristic of the secure feature may be determined based on known properties of the secure feature. A determination as to whether the credential is authentic may be based on a comparison of the determined optical characteristic of the secure feature to the expected optical characteristic of the secure feature.
Authentication of a Physical Credential
Aspects described herein may provide detection of a physical characteristic of a credential, thereby allowing for authentication of the credential. According to some aspects, these and other benefits may be achieved by detecting the physical characteristic with the credential. An image of a credential may be received. An optical characteristic of a secure feature of the credential may be determined. An expected optical characteristic of the secure feature may be determined based on known properties of the secure feature. A determination as to whether the credential is authentic may be based on a comparison of the determined optical characteristic of the secure feature to the expected optical characteristic of the secure feature.
BLOCKCHAIN-BASED ADMISSION PROCESSES FOR PROTECTED ENTITIES
Arrangements for controlling access to a protected entity include receiving a redirected client request to access the protected entity that includes a public key of the client; granting, in response to the received redirected request, access tokens of a first type to a client using the public key of the client; identifying a conversion transaction identifying a request to convert the first type of access tokens with access tokens of a second type, the transaction designating the protected entity; determining a conversion value for converting the first-type access tokens into second-type access tokens based on at least one access parameter; converting, using the conversion value, a first sum of the first-type access tokens into a second sum of second-type access tokens; and granting the client access to the protected entity when the sum of second-type of access tokens is received as a payment from the protected entity.
Mobile device and control method thereof
A mobile device is provided. The mobile device includes a display unit, a sensor configured to sense user's touch done on a surface of the display unit in a disabled state of the display unit, a storage unit configured to store preset gesture information, a controller configured to enable the display unit when a user's touch operation matched with the gesture information is sensed, execute a wallet application, and display an execution screen, and a communication unit configured to transmit information for a selected payment option to an external apparatus when the payment option is selected on the execution screen and perform a payment. The payment is simply done.
Mobile device and control method thereof
A mobile device is provided. The mobile device includes a display unit, a sensor configured to sense user's touch done on a surface of the display unit in a disabled state of the display unit, a storage unit configured to store preset gesture information, a controller configured to enable the display unit when a user's touch operation matched with the gesture information is sensed, execute a wallet application, and display an execution screen, and a communication unit configured to transmit information for a selected payment option to an external apparatus when the payment option is selected on the execution screen and perform a payment. The payment is simply done.
Credential manager integration
Techniques are disclosed relating to credential managers. In some embodiments, a computing device maintains a credential manager that stores, in a protected manner, a set of credentials for authenticating a user and metadata about the credentials. The computing device stores an instance of the metadata externally to the credential manager. The computing device uses the externally stored metadata to determine whether the set of credentials includes a particular credential associated with a service and, in response to determining that the set of credentials includes the particular credential, displays an indication of the particular credential. In some embodiments, the computing device receives a selection of the displayed indication by the user and, in response to the selection, sends a request for the particular credential to the credential manager.
Credential manager integration
Techniques are disclosed relating to credential managers. In some embodiments, a computing device maintains a credential manager that stores, in a protected manner, a set of credentials for authenticating a user and metadata about the credentials. The computing device stores an instance of the metadata externally to the credential manager. The computing device uses the externally stored metadata to determine whether the set of credentials includes a particular credential associated with a service and, in response to determining that the set of credentials includes the particular credential, displays an indication of the particular credential. In some embodiments, the computing device receives a selection of the displayed indication by the user and, in response to the selection, sends a request for the particular credential to the credential manager.
COMPUTER CHALLENGE SYSTEMS BASED ON IMAGE ORIENTATION MATCHING
A method of securing a computer resource against unauthorized access includes sending, by a processing device, a challenge data structure to a user computer system, obtaining a user response representing at least one user-selected image from the plurality of images, and providing access to the computer resource for the user computer system based on whether the at least one user-selected image is consistent with the one or more correct images. The challenge data structure defines a challenge to be presented to a user of the user computer system. The challenge involves selecting one or more correct images that conform to one or more aspects of a challenge key from a plurality of images based on a relative orientation with respect to one another of elements within the plurality of images.