Patent classifications
G06F21/40
ENHANCED SECURITY AUTHENTICATION METHODS, SYSTEMS AND MEDIA
A transaction authorization apparatus includes a processor in communication with a communications interface. The processor is configured to receive a request for a transaction requested by a user with whom a plurality of user devices are associated, to obtain respective transaction measurements from at least some available devices from among the plurality of user devices, and to confirm approval of the request for the transaction in response to confirmation that the transaction measurements satisfy a multi-device authorization policy associated with the transaction.
Method and System for Associating a User with a Wearable Device
A method and system are provided for associating a user with a wearable device. The method includes: obtaining physiological information of a user of a wearable device; comparing the obtained physiological information against a stored physiological profile, wherein the stored physiological profile is built up over time from obtained physiological information; and, based on the comparison, updating a confidence parameter indicating the extent to which the obtained physiological information matches the physiological profile.
Password-less software system user authentication
Data is received as part of an authentication procedure to identify a user. Such data characterizes a user-generated biometric sequence that is generated by the user interacting with at least one input device according to a desired biometric sequence. Thereafter, using the received data and at least one machine learning model trained using empirically derived historical data generated by a plurality of user-generated biometric sequences (e.g., historical user-generated biometric sequences according to the desired biometric sequence, etc.), the user is authenticated if an output of the at least one machine learning model is above a threshold. Data can be provided that characterizes the authenticating. Related apparatus, systems, techniques and articles are also described.
Password-less software system user authentication
Data is received as part of an authentication procedure to identify a user. Such data characterizes a user-generated biometric sequence that is generated by the user interacting with at least one input device according to a desired biometric sequence. Thereafter, using the received data and at least one machine learning model trained using empirically derived historical data generated by a plurality of user-generated biometric sequences (e.g., historical user-generated biometric sequences according to the desired biometric sequence, etc.), the user is authenticated if an output of the at least one machine learning model is above a threshold. Data can be provided that characterizes the authenticating. Related apparatus, systems, techniques and articles are also described.
INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND PROGRAM
In authentication using sensor information, both reduction of processing burdens and assurance of security can be achieved.
Provided is an information processing device including an authentication unit configured to authenticate a user on the basis of collected sensor information, and the authentication unit authenticates the user on the basis of a single feature quantity extracted on the basis of sensor information collected by at least two sensors and a single registered feature quantity extracted on the basis of sensor information collected in advance by the at least two sensors.
INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND PROGRAM
In authentication using sensor information, both reduction of processing burdens and assurance of security can be achieved.
Provided is an information processing device including an authentication unit configured to authenticate a user on the basis of collected sensor information, and the authentication unit authenticates the user on the basis of a single feature quantity extracted on the basis of sensor information collected by at least two sensors and a single registered feature quantity extracted on the basis of sensor information collected in advance by the at least two sensors.
Multi-factor automated teller machine (ATM) personal identification number(PIN)
An automated teller machine (ATM) may include an input component and one or more processors. The input component may be configured to detect multi-factor input associated with an account. The multi-factor input may include at least two of: a sequence of characters input via the input component, a force with which at least one character, of the sequence of characters, is input via the input component, a length of time over which at least one character, of the sequence of characters, is input via the input component, or a combination of at least two characters, of the sequence of characters, that are input concurrently via the input component. The ATM may receive the multi-factor input, validate the multi-factor input in association with the account, and selectively permit or deny access to one or more actions associated with the account based on validating the multi-factor input.
Multi-factor automated teller machine (ATM) personal identification number(PIN)
An automated teller machine (ATM) may include an input component and one or more processors. The input component may be configured to detect multi-factor input associated with an account. The multi-factor input may include at least two of: a sequence of characters input via the input component, a force with which at least one character, of the sequence of characters, is input via the input component, a length of time over which at least one character, of the sequence of characters, is input via the input component, or a combination of at least two characters, of the sequence of characters, that are input concurrently via the input component. The ATM may receive the multi-factor input, validate the multi-factor input in association with the account, and selectively permit or deny access to one or more actions associated with the account based on validating the multi-factor input.
Threshold-based authentication
An authentication system receives authentication information from a user as part of a request to access a web-based service. The authentication system transmits the authentication information to a set of second users authorized to evaluate the authentication information. If a threshold number of the set of second users authenticate the identity of the first user, the authentication system enables the user to access the web-based service.
Threshold-based authentication
An authentication system receives authentication information from a user as part of a request to access a web-based service. The authentication system transmits the authentication information to a set of second users authorized to evaluate the authentication information. If a threshold number of the set of second users authenticate the identity of the first user, the authentication system enables the user to access the web-based service.