G06F21/43

Terminal device, personal authentication system and personal authentication method
11483713 · 2022-10-25 · ·

A technology which is highly safe and furthermore highly convenient in personal authentications via a mobile terminal is provided. A terminal device 200 of the present invention includes: a position determining section 271 that determines a position of the terminal device 200 at predetermined time intervals, and accumulates the position as position information; a movement history generating section 272 that generates a movement history by using the position information accumulated in a predetermined period, and stores the movement history as movement history information; a registration processing section 276 that transmits, for registration, the movement history information to a personal authentication apparatus; and an authentication requesting section 279 that makes an authentication request to the personal authentication apparatus 310 by using the movement history information stored after the transmission by the registration processing section 276 to the personal authentication apparatus 310.

Device Engagement Connection System with Verification
20220337582 · 2022-10-20 ·

A method comprises transferring information that includes a response uniform resource locator (URL) between a primary device and a secondary device using a primary communication channel between the primary device and the secondary device; determining, using the secondary device, status of connectivity of a network separate from the primary communication channel; transmitting, by the secondary device, a response to a request from the primary device via the network using the response URL when the status indicates the network is available, and transmitting the response via the primary communication channel when the status indicates the network is unavailable.

Authentication method and system for a telecommunications system
11599607 · 2023-03-07 ·

An authentication method for a telecommunications system comprising a computer network and a telephone network that includes receiving, at an Authentication System across the computer network, data indicative of an authentication request. The request is typically made by a provider in connection with a user (e.g. by a provider to obtain authentication from a user as the result of an authentication trigger detected by a provider system). A telephone call is establishing by the telephone network between the Authentication System and a telephone device with a telephone number associated with the user. A PIN is received from the user at the Authentication System during the telephone call. It is then determined if the received PIN is valid. The authentication request is authenticated if the PIN is determined to be valid.

Multi-factor user authentication for network access

An authentication server associated with a network authenticates a primary user credential responsive to a request from a client device to access the network. The authentication server queries a database server for contact information for obtaining a secondary user credential. The contact information is provided to a third-party authentication server to obtain and authenticate the secondary user credential. In response to both the third-party authentication server obtaining and authenticating the secondary user credential successfully and the authentication server authenticating the primary user credential successfully, the client device is granted access to the network.

Intuition-based challenges

A system can be configured to determine whether a user is a human or a computer based on whether the user is capable of intuitive-based decision making to identify requested features. The system can generate a challenge that includes a question emphasizing mental shortcuts and associations developed through social and cultural interactions. The challenge also includes one or more media objects that are distinguishable to a human user due to the mental shortcuts and associations that permit selection of the correct media object in light of the question. Intuitive connections between statements and media objects are often difficult to implement within computer programs and algorithms due to the two-stage challenge requiring both comprehension and recognition of important features.

Intuition-based challenges

A system can be configured to determine whether a user is a human or a computer based on whether the user is capable of intuitive-based decision making to identify requested features. The system can generate a challenge that includes a question emphasizing mental shortcuts and associations developed through social and cultural interactions. The challenge also includes one or more media objects that are distinguishable to a human user due to the mental shortcuts and associations that permit selection of the correct media object in light of the question. Intuitive connections between statements and media objects are often difficult to implement within computer programs and algorithms due to the two-stage challenge requiring both comprehension and recognition of important features.

CONTROL DEVICE AND CONTROL METHOD

To provide a control device and control method that make it possible to reduce inter-device authentication failure.

Provided is a control device including a control section configured to execute an authentication process of authenticating another device on the basis of information for authentication acquired from the other device. The control section starts the execution of the authentication process in the case where a predetermined trigger is acquired.

CONTROL DEVICE AND CONTROL METHOD

To provide a control device and control method that make it possible to reduce inter-device authentication failure.

Provided is a control device including a control section configured to execute an authentication process of authenticating another device on the basis of information for authentication acquired from the other device. The control section starts the execution of the authentication process in the case where a predetermined trigger is acquired.

MULTIDEVICE USER AUTHENTICATION IN GROUP-BASED COMMUNICATION SYSTEMS
20230064364 · 2023-03-02 ·

Method, apparatus and computer program product for multi-device user authentication are described herein. For example, the apparatus includes at least one processor and at least one non-transitory memory including program code. The at least one non-transitory memory and the program code are configured to, with the at least one processor, identify, on a first computing device, a first active interface session associated with one or more active authentication conditions each configured to enable access to a group-based communication interface of a group-based communication system; cause a first computing device to present an authentication command interface for the first active interface session; receive an interface session request from a second computing device indicating electronic communication by the second computing device with the authentication command interface; and cause the second computing device to execute limited user authentication routines each configured to enable a respective active authentication condition on the second computing device.

MULTIDEVICE USER AUTHENTICATION IN GROUP-BASED COMMUNICATION SYSTEMS
20230064364 · 2023-03-02 ·

Method, apparatus and computer program product for multi-device user authentication are described herein. For example, the apparatus includes at least one processor and at least one non-transitory memory including program code. The at least one non-transitory memory and the program code are configured to, with the at least one processor, identify, on a first computing device, a first active interface session associated with one or more active authentication conditions each configured to enable access to a group-based communication interface of a group-based communication system; cause a first computing device to present an authentication command interface for the first active interface session; receive an interface session request from a second computing device indicating electronic communication by the second computing device with the authentication command interface; and cause the second computing device to execute limited user authentication routines each configured to enable a respective active authentication condition on the second computing device.