Patent classifications
H04L2463/082
SECURITY DRIVER EXTERNAL FUNCTIONS
Provided are processes to increase security of database systems, in some cases with transparent retrofits. Examples may include the calling of external functions responsive to a data access event, such as detected by a database driver, upon connection attempt to, request attempt to, or retrieval of data from a database arrangement of a storage environment. The database driver, in response to detecting an event, may perform a call to an API, like a RESTful API, of a component or system that effectuates logic for determining instructions provided back to the database driver for responding to the event.
System and method to retrieve a secure message when a display of a mobile device is inaccessible
Systems and methods are described for providing a security code to a second device. A first device receives a textual representation of a security code that is required for authorization of a second device with a remote application server. The first device checks if the textual representation of the security code is accessed during a predefined time period. If not, the first device also checks if the second device is within an output range of the first device. If so, the first device outputs an audio representation of the security code.
METHODS, MEDIUMS, AND SYSTEMS FOR VERIFYING DEVICES IN AN ENCRYPTED MESSAGING SYSTEM
This application describes methods, mediums, and systems for verifying a device for use in a messaging system. Using the device verification procedures described, a messaging system can securely authorize new devices to send and receive encrypted messages on behalf of a user, preferably without the need to share a private encryption key between the users' different devices. The application describes several techniques that can be used to provide such a system, including distributing a computer-perceptible code that encodes encryption information between a secondary device and a primary device. This allows the information to be distributed without intervention by a server. Other techniques provide unique ways to build and reverify authorized device lists, distribute encryption keys in chat channels, ensure that lists of authorized devices are distributed in the correct order and remain valid for an appropriate amount of time, add new devices to an ongoing or new conversation, and more.
Multi-factor authentication and access control in a vehicular environment
The systems and methods described herein can include a digital assistant application that receives sensor signals from sensors installed in a vehicle and determines an entry event into the vehicle. The digital assistant application can receive, responsive to the entry event into the vehicle, a plurality authentication input signals from a plurality of sensors associated with the vehicle. The digital assistant application can determine a plurality of authentication states based on the plurality of authentication input signals and a plurality of authentication credentials. The digital assistant application can identify an access permission level of a plurality of access permission levels based at least in part on the plurality of identifies authentication states. The digital assistant application can identify, responsive to the access permission level, a subset of a set of functionalities available via the vehicle, and provide vehicular access to the subset of functionalities.
Login and authentication methods and systems
Systems, methods, and apparatuses for authenticating requests to access one or more accounts over a network using authenticity evaluations of two or more automated decision engines are discussed. A login request for access to a user account may be submitted to multiple decision engines that each apply different rulesets for authenticating the login request, and output an evaluation of the authenticity of the login request. Based on evaluations from multiple automated decision engines, the login request may be allowed to proceed to validation of user identity and, if user identity is validated, access to the user account may be authorized. Based on the evaluations, the login attempt may also be rejected. One or more additional challenge question may be returned to the computing device used to request account access, and the login request allowed to proceed to validation of identity if the response to the challenge question is deemed acceptable.
Mobile device verification for an electronic application before providing a digital pass to an approved customer
A system and method for mobile device verification for an electronic application before providing a digital pass to an approved customer is disclosed. The method and system receives, at a store's customer credit application computer, an application for a new account, the application including a contact information for a customer's mobile device providing, from the store's customer credit application computer, the contact information for the customer's mobile device to a verification system to authenticate the customer's mobile device providing, from a credit account provider, a text to the customer's mobile device, the text causing the customer's mobile device to be subjected to a second authentication; receiving, at the customer's mobile device, a message that includes a link to the digital pass; and utilizing the link to receive the digital pass at a mobile wallet of the customer's mobile device.
System for prevention of unauthorized access using authorized environment hash outputs
When a system tries to access a network (e.g., another system, an application, data, or the like) at least two-factor authentication may be used to validate the system. At least one authentication factor may include utilizing authentication credentials of the entity or system accessing the network. At least a second authentication factor may include using an environment hash of the system, which is a representation of the configuration (e.g., hardware, software, or the like) on the system trying to access the network. The environment hash may be compared to hash requirements (e.g., authorized environment hashes, unauthorized environment hashes, or the like) to aid in the validation. The system may only access the network when both the authentication credentials and the environment hashes meet requirements.
PROTECTING PHYSICAL LOCATIONS WITH CONTINUOUS MULTI-FACTOR AUTHENTICATION SYSTEMS
This disclosure relates to methods, systems, and non-transitory computer-readable storage media for integrating a multi-factor authentication system with a security system. The present technology can receive authentication data descriptive of a user associated with a user device. The present technology can also permit the user to access a secure physical location. The present technology can also limit capabilities of the user device while the user is within the secure physical location.
DETECTING THREAT PATHWAYS USING SEQUENCE GRAPHS
A method for detecting threat pathways using sequence graphs includes constructing a sequence graph from a set of data containing information about activities in a telecommunications service provider network, where the sequence graph represents a subset of the activities that occurs as a sequence, providing an embedding of the sequence graph as input to a machine learning model, wherein the machine learning model has been trained to detect when an input embedding of a sequence graph is likely to indicate a threat activity, determining, based on an output of the machine learning model, whether the subset of the activities is indicative of the threat activity, and initiating a remedial action to mitigate the threat activity.
Enrollment of a device in a secure network
A method for enrolling a device in a secure network to which an information system is connected, the method comprising the steps, implemented by a trusted device connected to the secure network, of: a) receiving from a user terminal, distinct from the device to be enrolled, an authorization to connect to the device to be enrolled, b) generating cryptographic keys intended for the device to be enrolled to access the secure network, and c) transmitting the cryptographic keys to the device to be enrolled.