Patent classifications
G06F21/128
Monitoring Web-Based Exams
According to certain aspects of the present disclosure, a computer-implemented method is provided. The method includes receiving, at a manager device, data comprising at least one managed device. The method includes identifying, at the manager device, a website associated with the at least one managed device. The method also includes receiving, at a mobile device management server from the manager device, a first message to cause the mobile device management server to initiate transmission of a second message comprising a command that causes the at least one managed device to navigate to the website via a browser, restrict access to other websites other than the website, and enable a camera. Systems and machine-readable media are also provided.
AUTHENTICATION TRANSLATION
Authentication translation is disclosed. A request to access a resource is received at an authentication translator, as is an authentication input. The authentication input corresponds to at least one stored record. The stored record is associated at least with the resource. In response to the receiving, a previously stored credential associated with the resource is accessed. The credential is provided to the resource.
SYSTEMS AND METHODS FOR USER AUTHENTICATION
Methods and systems for user authentication. At a server, receiving unique fingerprint information for an unauthenticated browsing session with the server by a first user device. The unique fingerprint information received is compared with respective historical fingerprint information associated with a plurality of user accounts stored on the server. Based on the comparison, determining that one of the plurality of user accounts has associated historical fingerprint information that matches the unique fingerprint information with at least a threshold confidence level. In response to receiving user input from a second device indicating that the unauthenticated browsing session corresponds to the one of the plurality of user accounts, associating the unauthenticated browsing session with the one of the plurality of user accounts.
Systems and methods for secure SaaS redirection from native applications
Systems and methods discussed for redirection of launch requests for local applications to corresponding remote applications, such as SaaS or network applications provided by an application server, and access of the corresponding remote application via an embedded browser of a client application. A client application executed by a client device may detect a request of a user to launch a local application of the client device. The client application may determine that the local application corresponds to a network application provided by an application server. The client application may intercept the request to launch the local application, responsive to the determination. An embedded browser of the client application may access the network application from the application server, responsive to interception of the request.
Systems and methods for remotely verifying identity of non-resident aliens
A method for remotely verifying a non-resident alien's identity, includes: receiving a request to establish a communication session from a user device; analyzing the request to determine whether the user device is compromised; in response to determining that the user device is not compromised, providing a page flow to the user device to solicit information from the non-resident alien, the information including identity information associated with a local foreign government identification document (ID), and other information not shown on the local foreign government ID; querying one or more foreign governmental data stores to identify foreign data associated with the non-resident alien based on a unique identifier associated with the local foreign government ID; comparing the information with the foreign data; and verifying an identity of the non-resident alien based on the comparing, wherein the verifying includes determining that at least one of the other information matches the foreign data.
DECENTRALIZED DOCUMENT AND ENTITY VERIFICATION ENGINE
A system and method enabling an entity to prove its identity and provide authentic documents/data/information therein at any time required based upon data retrieved from an independent cryptographically verifiable source (ICVS) through a secured channel is disclosed. The system enables a virtual and secure browser on a user computing device allowing a user to login and retrieve authentic information pertaining to the user from the ICVS in a verifiable and untamperable manner. The retrieved information is bounded with origination information of the ICVS and the bounded information is provided to relying entities as authentic information for verification. Also, cryptographic value of the authentic information can be stored in an immutable storage such as blockchain, so that the cryptographic value is used by the relying-party to validate integrity of the authentic information.
Common database for live operation and testing of a website
Disclosed embodiments relate to simultaneously running live data of a website in a website deployment environment while also running test data of the website in a non-public website testing environment. Operations include storing the live data and test data of the website; accessing the live data; using the live data to render the website; receiving a request to perform testing on the website while the website is live in the website deployment environment; accessing a set of the test data responsive to the request; and while the website is operating in the website deployment environment, testing the website in parallel in the non-public website testing environment such that both the set of test data and the live data are used simultaneously by the website in the non-public website testing environment.
Systems and methods for deploying countermeasures against unauthorized scripts interfering with the rendering of content elements on information resources
Systems and methods for deploying countermeasures against unauthorized scripts interfering with the rendering of content elements on information resources are provided herein. A computing device can receive an information resource including a content rendering verification script and a first content element. The computing device can execute the script. The computing device can render the first content element for display on the information resource in a first format. The computing device can determine that the first content element is not successfully displayed in the first format. The computing device can render the first content element for display on the information resource in a second format, responsive to the determination. The computing device can determine that the first content element is successfully displayed in the second format. The computing device can display a second content element of the information resource responsive to the determination.
DECENTRALIZED DOCUMENT AND ENTITY VERIFICATION ENGINE
A system and method enabling an entity to prove its identity and provide authentic documents/data/information therein at any time required based upon data retrieved from an independent cryptographically verifiable source (ICVS) through a secured channel is disclosed. The system enables a virtual and secure browser on a user computing device allowing a user to login and retrieve authentic information pertaining to the user from the ICVS in a verifiable and untamperable manner. The retrieved information is bounded with origination information of the ICVS and the bounded information is provided to relying entities as authentic information for verification. Also, cryptographic value of the authentic information can be stored in an immutable storage such as blockchain, so that the cryptographic value is used by the relying-party to validate integrity of the authentic information.
Automatic generation of app-specific client certification
Techniques for automatic generation of app-specific client certification are disclosed herein. In one embodiment, a method includes receiving, at a web server in a packaged application containing a co-packaged web client, a connection request from a web client and a first copy of a client certificate from the web client. Upon receiving the client certificate, the web server can authenticate the connection request from the web client using a second copy of a client certificate previously generated by the web server for the co-packaged web client. In response to successfully authenticating, based on both the first and second copies of the client certificate, the web server can establish a secure connection with the web client to allow the web client access to system level services on the computing device. Otherwise, the web server would refuse connection.