Patent classifications
G06F21/43
MULTI-LAYERED AUTHENTICATION AND PERMISSION METHODS, SYSTEMS AND APPARATUSES
A method can include receiving user input values via a plurality of inputs of a motor vehicle and determining if each received user input value corresponds to an authenticated user value in a secure memory of the motor vehicle. For each received user input value corresponding to an authenticated user value, a certainty factor corresponding to the authenticated user value can be accessed from a secure memory. A certainty score can be generated from all accessed certainty factors. Each of a plurality of permissions for operating or accessing the motor vehicle can be enabled in response to a comparison between the certainty score and a certainty threshold assigned to each permission. Corresponding devices and systems are also disclosed.
Single sign-on service authentication through a voice assistant
Disclosed are various approaches for authenticating a user through a voice assistant device and creating an association between the device and a user account. The request is associated with a network or federated service. The user is prompted to use a client device, such as a smartphone, to facilitate an authentication flow. A soundwave is played through the client device that contains a secret key, which is then sent to a service that validates the secret key. An association between the user account and the voice assistant device can then be created so that access to third party services can occur.
SYSTEM AND METHOD FOR DYNAMIC MULTI-FACTOR AUTHENTICATION
Systems and methods for authenticating users are described herein. One or more inputs including of biometric data, physical trait data, and other data sources may be collected passively when an individual is present in a space. A confidence ratio associated with one or more of the collected inputs may be determined. One or more of the determined confidence ratios may be evaluated together to determine a final confidence ratio for a user, on which an authentication decision is based. An access level may be selected from a plurality of access levels with different access privileges based on the determined confidence ratio. Authentication may be continuous or ongoing.
SYSTEM AND METHOD FOR DYNAMIC MULTI-FACTOR AUTHENTICATION
Systems and methods for authenticating users are described herein. One or more inputs including of biometric data, physical trait data, and other data sources may be collected passively when an individual is present in a space. A confidence ratio associated with one or more of the collected inputs may be determined. One or more of the determined confidence ratios may be evaluated together to determine a final confidence ratio for a user, on which an authentication decision is based. An access level may be selected from a plurality of access levels with different access privileges based on the determined confidence ratio. Authentication may be continuous or ongoing.
Methods and systems for blocking malware attacks
User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple software applications, web applications, web services, etc. embody this confidential data it is a tradeoff between easy recollection of said identities, passwords, etc. and data security. However, malware by intercepting user credentials provides third parties access to even complex passwords, user credentials, security keys etc. even where these are changed/updated regularly. Within the prior art substantial work has gone into addressing malware. However, in many instances the user is at or very near the computer with a software application executing a transaction requiring credentials/authorisation with a portable electronic device or another device. Accordingly, it would be beneficial to provide users with an out-of-band communications channel for exchanging credentials and/or keys etc.
Methods and systems for blocking malware attacks
User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple software applications, web applications, web services, etc. embody this confidential data it is a tradeoff between easy recollection of said identities, passwords, etc. and data security. However, malware by intercepting user credentials provides third parties access to even complex passwords, user credentials, security keys etc. even where these are changed/updated regularly. Within the prior art substantial work has gone into addressing malware. However, in many instances the user is at or very near the computer with a software application executing a transaction requiring credentials/authorisation with a portable electronic device or another device. Accordingly, it would be beneficial to provide users with an out-of-band communications channel for exchanging credentials and/or keys etc.
Authorization method and authorization system displaying authorization information on e-paper
An authorization method and an authorization system are provided. The authorization method includes displaying, by a service device, authorization information on an e-paper arranged on the service device; obtaining, by a user device, the authorization information from the e-paper; and using, by the user device, the authorization information displayed on the e-paper to perform an authorization operation between the user device and the service device.
TRAVEL IDENTITY TOKENING
A system for leveraging a tokening system to authenticate a traveler while maintaining anonymity of the traveler is provided. The system may include a secure central server configured to store identification data associated with a plurality of users. The system may also include a mobile token application for providing a token identifier representing a user's identification data. The mobile token application may be activated by the central server on a mobile device of the user registered with the central server and stored in a secure storage on the mobile device of the user. The system may also include a travel service provider. The travel service provider may be configured to enable reserving a travel reservation file. The travel service provider may be enabled to retrieve a token identifier from the user's mobile device as representing the identification of the user and verify the token identifier with the central server.
Methods and systems for validating mobile devices of customers via third parties
A method for authenticating a mobile device in real-time. The method includes detecting the mobile device, sending a text message containing a unique uniform resource locator (“URL”) to the mobile device, and detecting an access of the unique URL by the mobile device through a first communication path. In response to detecting the access of the unique URL, requesting and subsequently receiving, by the host system in real-time, a phone number and a subscriber identification ID associated with the mobile device through a second communication path distinct from the first communication path, and a device fingerprint of the mobile device through the first communication path. The method further includes initiating a risk analysis based on the phone number, the subscriber ID, and the device fingerprint and determining an authentication status of the mobile device based on the risk analysis.
Methods and systems for validating mobile devices of customers via third parties
A method for authenticating a mobile device in real-time. The method includes detecting the mobile device, sending a text message containing a unique uniform resource locator (“URL”) to the mobile device, and detecting an access of the unique URL by the mobile device through a first communication path. In response to detecting the access of the unique URL, requesting and subsequently receiving, by the host system in real-time, a phone number and a subscriber identification ID associated with the mobile device through a second communication path distinct from the first communication path, and a device fingerprint of the mobile device through the first communication path. The method further includes initiating a risk analysis based on the phone number, the subscriber ID, and the device fingerprint and determining an authentication status of the mobile device based on the risk analysis.