H04L2463/082

AUTHENTICATION BASED ON A PHYSICAL KEY

A device may obtain registration data associated with a registration of an individual. The registration data may include an image that depicts a physical key and a reference object. The device may process the image to identify a first feature of the physical key and a first measurement of the first feature based on the size of the reference object. The device may store first feature data based on the first feature and the first measurement. The device may obtain second feature data based on a second feature of the physical key and a second measurement of the second feature identified from an insertion of the physical key into a keyhole of an authentication mechanism. The device may determine whether the first feature data corresponds to the second feature data. The device may authenticate the individual based on determining that the first feature data corresponds to the second feature data.

METHODS, SYSTEMS, AND DEVICES FOR SECURE CROSS-BORDER PAYMENTS WITH HIGH TRANSACTION THROUGHPUT
20220108312 · 2022-04-07 ·

Disclosed herein are methods, systems, and devices for providing secure national and/or cross-border payments with high transaction throughput using a hybrid of centralized payment system and cryptographically secure distributed ledger technologies? The system combines the benefits of a centralized system, including the ability to deposit and withdraw fiat currency following bank regulations, “Know Your Customer”/“Know Your Business” (KYC/KYB), “Anti-Money Laundering” (AML), with high security of cryptographically secure distributed ledger technology to solve security issues. A multi-chain structure is used to implement the methods with instant settlement, high security, integrity and scalability.

AUTHENTICATION SYSTEM AND AUTHENTICATION METHOD

An authentication system includes a terminal and a key authentication unit arranged in a communication peer that communicates with the terminal. The key authentication unit receives key information of the terminal carried by a user through wireless communication and performs key authentication that verifies authenticity of the key information. The authentication system further includes detectors that are arranged at different locations and detect biological information of the user and a biometric authentication unit that uses the biological information to perform biometric authentication. The authentication system further includes a controller that controls actuation of the communication peer based on a location of one of the detectors that detected the biological information, an authentication result of the key authentication, and an authentication result of the biometric authentication.

Method for opening a secure session on a computer terminal
11303630 · 2022-04-12 · ·

A method for initiating a secure session using a smartphone as a physical token to provide strong authentication. The phone is used through a public and independent real-time notification service. The notifications are exchanged in an encrypted manner so that their content is only accessible to the mobile phone and the authentication server.

Electronic device

Disclosed is an electronic device including: an input unit provided with buttons; a plurality of sensors; and a controller configured to activate at least some of the plurality of sensors based on a received activation signal, generate authentication information based on at least one of the activated sensors, calculate a final security level score based on a security level score corresponding to the at least one authentication information, and determine whether a target service or a target external device is accessible, based on the calculated final security level score.

Electronic device

Disclosed is an electronic device including: an input unit including buttons; a plurality of sensors; and a controller configured to generate at least one authentication information based on at least some of the plurality of sensors, calculate a final security level score based on a security level score corresponding to the at least one authentication information, and determine whether a target service or a target external device is accessible, depending on the final security level score, wherein the security level score is set differently based on a type of the at least one authentication information. Accordingly, it is possible to easily access the target service or the target external device through multi-factor authentication.

Systems and method for authenticating users of a data processing platform from multiple identity providers

A system and method for authenticating users of a data processing platform stores a mapping of a unique user platform identifier to multiple user identity provider identifiers associated with multiple realms for a same user. In some examples, the method includes receiving a request from a client device to establish an access session to perform one or more actions on data of the data processing platform and receiving, from at least one of the first external identity provider of the first realm or the second external identity provider of the second realm, a user identity provider identifier associated with the request. In certain examples, the method includes granting permission to perform the one or more actions on the data of the data processing platform based at least in part on the received user identity provider identifier.

Chain of custody for enterprise documents

A ledger stores chain of custody information for files throughout an enterprise network. By identifying files with a homologous identifier such as a fuzzy hash that permits piecewise evaluation of similarity, the ledger can be used to track a chain of custody over a sequence of changes in content, ownership, and file properties. The ledger can be used, e.g., to evaluate trustworthiness of a file the first time it is encountered by an endpoint, or to apply enterprise policies based on trust.

SECURE WIRELESS AUDIO AND SPEECH AT A TRANSACTION TERMINAL

Audio/speech-based and text-based interactions between a transaction terminal and a user conducting a transaction are provided. In an embodiment, the terminal may establish a direct wireless connection to a user-operated device or an indirection wireless connection to the user-operated device through a proxy device. In an embodiment, the wireless connection is automatically established through a different out-of-band wireless communication between the terminal and the user-operated device. In an embodiment, text-based data for the transaction are provided over a second simultaneous wireless connection that is different from the wireless connection associated with providing the audio/speech data. In an embodiment, audio/speech data provided from the user during the transaction are enhanced for security and are filtered for accuracy using audio-based processing and/or image-based processing. In an embodiment, a speech-to-text and text-to-speech interface for a transaction at the terminal is provided.

Validation engine

In accordance with some embodiments, an apparatus for privacy protection is provided. The apparatus includes a housing arranged to hold a personal communication device. The apparatus further includes a local communication device at least partially supported by the housing, where the local communication device includes a personal communication device interface modem operable to provide a communication channel between the peripheral interface and the personal communication device. The apparatus further includes a validation engine coupled to the local communication device and operable to validate at least one of one or more portions of the personal communication device, a user of the personal communication device, or operational status of the personal communication device through the local communication device.