Patent classifications
G06F21/42
Security authentication system for membership login of online website and method thereof
A security authentication system for a website provides a safe login without having to directly enter an ID and a password on a user device requesting login to the website. A first user device receives one-time use authentication information from a second user device after the second user device received the one-time use authentication information from an authentication server without the authentication server receiving user login authentication information from the second user device. A request is transmitted to the authentication server based on the one-time use authentication information and the user login authentication information. In response to the request, one-time password (OTP) information is received from the authentication server. The OTP information is presented by the first user device, such that the OTP information can be entered into the second user device and used in a request to log in to the website.
Administered authentication in artificial reality systems
An administered authentication system can authenticate an artificial reality device using an authorization record between a user account and an artificial reality device. In some implementations, the authorization record is created in response to activation of a user account-specific key sent to a user-supplied contact, where an artificial reality device identifier was provided with the user-supplied contact. In other implementations, the authorization record is created in response to activation of a user account-specific key provided to the artificial reality device as a code, where activation of the key includes adding an artificial reality device identifier to a key activation message. In yet other implementations, the authorization record is created in response to an application associated with a user account activating an artificial reality device-specific key, with an artificial reality device identifier, that is provided via the artificial reality device.
Separately Collecting and Storing Form Contents
Apparatuses, systems and methods are described herein for separately collecting and storing form contents. Different information may be collected from a user on a form. Based on determining that portions of the form request a first type of information, an extended reality (XR) environment may be provided to the user. The user may provide the first type information via an input method in the XR environment. The user may provide a second type of information using a different input method outside of the XR environment. The first type of information may be processed and stored in a different database as compared to the second type of information. The database storing the first type of information may have a higher security standard than the database storing second type of information.
Out-of-band authentication based on secure channel to trusted execution environment on client device
Provided is a process that affords out-of-band authentication based on a secure channel to a trusted execution environment on a client device. The authentication process includes one or more authentication steps in addition to verifying any credentials provided by a client device. A notification may be transmitted by a server to a device other than the client device attempting to access the asset. That device may be a mobile device with a trusted execution environment storing user credential information, and the server may store representations of those credentials. The mobile device collects user input credentials and transmits representations for matching the previously stored representations and signed data for verification by the server that received data originated from the mobile device. The access attempt by the client is granted based in part on the result of authenticating the data received from the mobile device in a response to the notification.
Password protection with independent virtual keyboard
A virtual keyboard rendered on a separate computing device is independent of the user's computer. A virtual keyboard displayed on the user's computer screen is blank without any alphanumeric characters. Another virtual keyboard displayed on the user's independent computing device has a randomly generated layout of alphanumeric characters on a keypad. The user enters a password by pressing the blank keys of the blank keyboard on his computer screen with reference to the other virtual keyboard. The position sequence of these entered keys is sent to an application on a remote server computer. The remote server computer shares a virtual keyboard having the randomly generated layout of characters with the independent computing device via an online or off-line technique. When online, an encoded image of the encrypted layout is sent to the client computer and displayed for scanning by the device. When off-line, both the application and the device generate the same random key sequence by using the same pseudo random number generator and the same seed value.
Password protection with independent virtual keyboard
A virtual keyboard rendered on a separate computing device is independent of the user's computer. A virtual keyboard displayed on the user's computer screen is blank without any alphanumeric characters. Another virtual keyboard displayed on the user's independent computing device has a randomly generated layout of alphanumeric characters on a keypad. The user enters a password by pressing the blank keys of the blank keyboard on his computer screen with reference to the other virtual keyboard. The position sequence of these entered keys is sent to an application on a remote server computer. The remote server computer shares a virtual keyboard having the randomly generated layout of characters with the independent computing device via an online or off-line technique. When online, an encoded image of the encrypted layout is sent to the client computer and displayed for scanning by the device. When off-line, both the application and the device generate the same random key sequence by using the same pseudo random number generator and the same seed value.
DATA STORAGE
According to an example aspect of the present invention, there is provided an apparatus comprising a first part (110) which comprises a first light-based communication port (114) and a network interface (112), a second part (120) which comprises a non-volatile memory (122) and a second light-based communication port (124), and wherein the apparatus is configured to deactivate at least one of the first light-based communication port (114) and the second light-based communication port (124) responsive to determining that a read or write operation in the non-volatile memory (122) is complete.
ENABLING A FUNCTION OF AN APPLICATION BASED ON A CHARACTERISTIC OF A USER DEVICE
In some implementations, a user device may receive, from a user of the user device, a request to initiate an application session that is associated with an application. The user device may provide, to a server device based on receiving the request, an optical code associated with the server device establishing the application session. The user device may output the optical code via an output component. The user device may receive, from the server device, a notification that an agent device has joined the application session via a scan of the optical code from the output component. The user device may enable a function of the application based on the notification indicating that the agent device is capable of facilitating a service via the application session, wherein the service is associated with the function.
SYSTEMS AND METHODS FOR PRIVATE NODE-LEVEL DATA COMPUTING AND RECONCILIATION
Aspects and embodiments are directed to method and system for node based reconciliation. Various aspects also provide for real-time securities exchange while supporting cash based transactions. Additional aspects incorporate improved user interfaces for enabling single selection investment decisions for all of a clients' wealth.
SYSTEMS AND METHODS FOR PRIVATE NODE-LEVEL DATA COMPUTING AND RECONCILIATION
Aspects and embodiments are directed to method and system for node based reconciliation. Various aspects also provide for real-time securities exchange while supporting cash based transactions. Additional aspects incorporate improved user interfaces for enabling single selection investment decisions for all of a clients' wealth.