Patent classifications
H04L2463/082
SYSTEMS AND METHODS FOR SECURELY GENERATING AND PRINTING A DOCUMENT
Systems and methods for securely generating and printing documents are disclosed. For example, processor(s) of a computer system may receive information for the document from a computing device through a network, verify the information for the document, and upon verification, generate document generation data using at least a portion of the information for the document. The document generation data may include document metadata that enables generation of an image of the document and/or the image of the document. Upon the processor(s) verifying first authentication information of a first code associated with a printing device received from the computing device through the network and second authentication information of a second code associated with the computing device received from the printing device through the network, the processor(s) may transmit the document generation data to the printing device through the network, and cause the printing device to print the image of the document.
HOST-INITIATED AUTHENTICATION SYSTEM AND METHOD
The invention allows an invited recipient to enter a security-protected system such as a website without traditional authentication by providing the security-protected system with a pre-arranged host-initiated authentication on behalf of the recipient. An invite message advises the recipient of the invited action, which may be as simple as entering the system or performing a task within the system. The recipient accepts the invitation by affirmatively responding to the invite message which includes the unique code to identify the recipient. Upon receipt of the affirmative response with the unique code from the recipient, the system platform executes algorithms which assess the risk of completing the action with the invited recipient, and if appropriate, provides the authentication to the security-protected system which will allow the recipient to take the invited action without providing additional authentication, such as a password.
CONSENT-BASED AUTHORIZATION SYSTEM FOR TAXATION AND CONSUMER SERVICES
The subject matter of this specification can be implemented in, among other things, methods, systems, and computer-readable storage media. A method can include a first server receiving, from a first computing device, first data indicating a consumer service request, a consumer service entity identification (ID), and an authorization token each associated with a first user. The method further includes the first server sending to the second server an identity validation request identifying the first user, wherein the identity validation request comprises the consumer service entity ID and the authorization token. The method further includes the first server receiving from the second server a response to the identity validation request. The method further includes the first server causing an action to be performed corresponding to the consumer service request.
Method for improving user authentication performed by a communication device
Method for improving user authentication efficiency performed by a communication device belonging to an authentication system. The communication device includes a local machine learning engine having a set of N artificial neural network ANN1,i adapted to process N different types of input signals. The method includes the steps: receiving a first set of N input signals S_1(i) for authentication purpose; determining respectively for each of the N input signals S_1(i) by the N artificial neural networks ANN1,i, N estimations LH(i) of the likelihood that a given input signal is provided by a legitimate user; determining based on a risk scoring established using the N estimations LH(i) if the requesting user is authenticated as the legitimate user; if the requested user is authenticated, determining if at least one likelihood estimation determined for a given input signal S_1(j) is below a predetermined threshold T.sub.C,i, and if it is the case: transmitting the input signal S_1 (j) to a remote server implementing a server machine learning engine adapted to process said N different types of input signals and trained to identify a user U_C; receiving an input signal S_2(j) associated to the closest candidate U_C and executing by the local machine learning engine an additional learning phase using the input signal S_2(j) as an input signal that is not associated to the requesting user.
Authentication techniques in response to attempts to access sensitive information
The present disclosure describes techniques for changing a required authentication type based on a request for a particular type of information. For example, consider a situation where a user has asked a virtual assistant “who owns this device?” By default, the device may allow biometric authentication to unlock. In response to identification of the owner by the virtual assistant, however, the device may require one or more other types of authentication (e.g., manual entry of a passcode) to unlock the device. In various embodiments, the disclosed techniques may increase the security of the device by making it more difficult for malicious entities to obtain the sensitive information or to access device functionality once the sensitive information has been disclosed. In various embodiments, this may prevent or reduce unauthorized access to the device.
Software credential token process, software, and device
Embodiments for a computer readable medium including a software module are provided. The software module causes one or more processing devices to obtain a biometric identifier from a user. Access to a resource is requested by providing a software credential token and the biometric identifier. The software credential token corresponds to a hardware credential token, and the hardware credential token is one of a set of hardware credential tokens that are used to access the resource. An indication that access to the resource has been granted is received and after receiving the indication an indication that the access to the resource has been revoked is received. After receiving the indication that access to the resource has been revoked, a biometric identifier is re-obtained from a user and access to the resource is re-requested by providing a software credential token and the re-obtained biometric identifier.
Riding system of robot and method thereof
A riding system of a robot which supports a PUI through user authentication to provide convenience to users, and including a server for exchanging authentication information with the robot; a mobile terminal including an application interlocking with the server and for arranging use information of the user through the application and for calling the robot through the application; and a robot storing the authentication information, to authenticate the user through the authentication information when there is a call from the mobile terminal, and deforming according to a body size of the user included in the use information and to allow the user to ride thereon and to move the user to the destination, and a control method thereof.
Method and system for context aware frictionless authentication based on authentication scores
Described embodiments provide systems and methods for context aware frictionless authentication. A server may determine authentication method information, contextual scores and contextual weights of a device, in connection with a user request to access a resource via the device. The authentication method information may include a weight and a completion duration for each of a plurality of authentication methods available via the device. The server may determine an authentication score for each of the plurality of authentication methods using the authentication method information, the contextual scores and the contextual weights of the device. The server may identify a first authentication method from the plurality of authentication methods, according to the determined authentication score. The server may authenticate the user request via the first authentication method using a first device that supports the first authentication method.
Transport related n-factor authentication
An example operation includes one or more of determining, via a transport, that a person seeks access to the transport, visually indicating, via the transport, an action for the person to perform, receiving, via the transport, the action and validating, via the transport, that the person is associated with the transport, based on the receiving.
Authentication scheme in a virtual private network
A method in a virtual private network (VPN) environment, the method including determining, by a VPN server, an encrypted authentication packet based at least in part on utilizing an encryption key and a nonce to encrypt one or more fields of an initial authentication packet; transmitting, by the VPN server to an authentication server, the encrypted authentication packet to enable VPN authentication of a device requesting VPN services from the VPN server; determining, by the authentication server, a response regarding the VPN authentication based at least in part on decrypting the one or more fields utilizing a decryption key and the nonce; and transmitting, by the authentication server to the VPN server, the response regarding the VPN authentication. Various other aspects are contemplated.