Patent classifications
G06F21/40
MULTIFACTOR AUTHORIZATION ON ACCESSING HARDWARE RESOURCES
In an approach for multifactor authorization on hardware calls of resources, a processor receives a request for a hardware resource from a plurality of hardware resources being monitored. A processor calculates a risk level associated with the hardware resource of the request based on a respective risk level data repository. A processor, in response to a determination the risk level requires multifactor authorization, determines that a user associated with the request is logged in. A processor identifies a mechanism used by the user to log in. A processor determines whether a challenge associated with the multifactor authorization based on the mechanism is successful. A processor, in response to a determination the challenge associated with the multifactor authorization is successful, enables access to the hardware resource of the request.
MULTIFACTOR AUTHORIZATION ON ACCESSING HARDWARE RESOURCES
In an approach for multifactor authorization on hardware calls of resources, a processor receives a request for a hardware resource from a plurality of hardware resources being monitored. A processor calculates a risk level associated with the hardware resource of the request based on a respective risk level data repository. A processor, in response to a determination the risk level requires multifactor authorization, determines that a user associated with the request is logged in. A processor identifies a mechanism used by the user to log in. A processor determines whether a challenge associated with the multifactor authorization based on the mechanism is successful. A processor, in response to a determination the challenge associated with the multifactor authorization is successful, enables access to the hardware resource of the request.
Login and authentication methods and systems
Systems, methods, and apparatuses for authenticating requests to access one or more accounts over a network using authenticity evaluations of two or more automated decision engines are discussed. A login request for access to a user account may be submitted to multiple decision engines that each apply different rulesets for authenticating the login request, and output an evaluation of the authenticity of the login request. Based on evaluations from multiple automated decision engines, the login request may be allowed to proceed to validation of user identity and, if user identity is validated, access to the user account may be authorized. Based on the evaluations, the login attempt may also be rejected. One or more additional challenge question may be returned to the computing device used to request account access, and the login request allowed to proceed to validation of identity if the response to the challenge question is deemed acceptable.
Method of Authenticating the Identity of a User Wearing a Wearable Device
The method comprises obtaining a first source of authentication information for the user comprising a feature set extracted from biometric data sensed by sensors of the wearable device (S101). The extracted feature set is input into a recognition algorithm which uses the extracted feature set and predetermined feature set representing an authorised user that is authorised to use the wearable device, and generates a confidence level indicating the likelihood that the user wearing the wearable device is the authorised user (S102). A second source of authentication information is obtained from the user (S103). The method identifies, from the second source of authentication information, whether the user is authorised to use the wearable device (S104). If the user is authorised, the method authenticates the identity of the user wearing the wearable device as corresponding to the authorised user (S105).
Method of Authenticating the Identity of a User Wearing a Wearable Device
The method comprises obtaining a first source of authentication information for the user comprising a feature set extracted from biometric data sensed by sensors of the wearable device (S101). The extracted feature set is input into a recognition algorithm which uses the extracted feature set and predetermined feature set representing an authorised user that is authorised to use the wearable device, and generates a confidence level indicating the likelihood that the user wearing the wearable device is the authorised user (S102). A second source of authentication information is obtained from the user (S103). The method identifies, from the second source of authentication information, whether the user is authorised to use the wearable device (S104). If the user is authorised, the method authenticates the identity of the user wearing the wearable device as corresponding to the authorised user (S105).
IDENTITY AUTHENTICATION PROCESS
A scalable configurable universal complete spectrum identity authentication process that utilizes all or part of at least one computer, and necessary resources for making identity authentication determinations as to whether or not one specific sensor-observed tested person is the same person as the one specific known person he or she claims to be. The identity authentication process makes one-time, intermittently performed, or constantly performed identity authentication determinations regarding any one specific tested person, and it is configurable for doing so at any attainable level of accuracy including 100% accuracy. The identity authentication process is configurable for interacting with itself or utilized cyber resources to perform possible variable functions, it utilizes data representing recognized aspects, characteristics or features for comparing or determining, and it utilizes observation data, derived data, useful information, or outcomes from comparing for making identity authentication determinations, and it may report on any of its operations.
IDENTITY AUTHENTICATION PROCESS
A scalable configurable universal complete spectrum identity authentication process that utilizes all or part of at least one computer, and necessary resources for making identity authentication determinations as to whether or not one specific sensor-observed tested person is the same person as the one specific known person he or she claims to be. The identity authentication process makes one-time, intermittently performed, or constantly performed identity authentication determinations regarding any one specific tested person, and it is configurable for doing so at any attainable level of accuracy including 100% accuracy. The identity authentication process is configurable for interacting with itself or utilized cyber resources to perform possible variable functions, it utilizes data representing recognized aspects, characteristics or features for comparing or determining, and it utilizes observation data, derived data, useful information, or outcomes from comparing for making identity authentication determinations, and it may report on any of its operations.
Method and system for temporary use of biometric information of another for access to a system
A method and system for temporarily gaining access to a system is disclosed, The method includes: receiving biometric data from a first biometric device of a first user on a computer processor; generating a temporary code on the computer processor in response to receipt of the biometric data from the first biometric device of the first user; sending the temporary code from the computer processor to the first biometric device of the first user; receiving biometric data from a second biometric device of a second user on the first biometric device of the first user; generating an access code on the first biometric device, the access code including one or more of the biometric data of the first user, the temporary code from the computer processor, and the biometric data of the second user; and sending the access code to the biometric device of the second user.
Method and system for temporary use of biometric information of another for access to a system
A method and system for temporarily gaining access to a system is disclosed, The method includes: receiving biometric data from a first biometric device of a first user on a computer processor; generating a temporary code on the computer processor in response to receipt of the biometric data from the first biometric device of the first user; sending the temporary code from the computer processor to the first biometric device of the first user; receiving biometric data from a second biometric device of a second user on the first biometric device of the first user; generating an access code on the first biometric device, the access code including one or more of the biometric data of the first user, the temporary code from the computer processor, and the biometric data of the second user; and sending the access code to the biometric device of the second user.
User Equipment Auto-Unlock Optimization
A user equipment (UE) is configured to perform a prewarming process, wherein the prewarming process includes concurrently performing a face detection process and an unlock process independent of face detection, determine whether a face detection operation indicates the presence of a face within a field of view of a camera of the UE and disable prewarming for a predetermined time period when the face detection operation is not satisfied.