Patent classifications
H04L2463/082
Access Control Using User Behavior Profile and Storage System-Based Multi-Factor Authentication
Techniques are provided for access control using user behavior profiles and storage system-based multi-factor authentication. One method comprises obtaining a behavior profile for a user; obtaining an input/output request from the user; determining whether the input/output request exhibits anomalous user behavior relative to the behavior profile; initiating a multi-factor authentication of the user in response to the input/output request exhibiting anomalous user behavior to obtain a verification result; and processing the input/output request based at least in part on the verification result. The behavior profile for the user may be obtained by obtaining behavioral information from the user and/or monitoring a plurality of input/output requests of the user to learn at least a portion of the behavior profile for the user. The multi-factor authentication may comprise an out-of-band authorization request (e.g., to approve the input/output request) sent to a user associated with the input/output request.
MULTI-FACTOR AUTHENTICATION SECURITY SYSTEM AND METHOD FOR VERIFYING IDENTIFICATION USING EVOLVING PERSONAL DATA COMBINED WITH BIOMETRICS
A method for generating and authenticating a user account in a system including entering personal information into the system of a vendor, selecting an image for the user account, selecting a personal identification number (PIN) for the user account, selecting a color for the user account, selecting a shape, selecting a word for the user account, recording audio for the user account, inputting biometric markers the user account, receiving a transaction information request for requested information in the system, verifying the requested information and matching account information of a requesting user to the user account in the system, determining if the requested information involves personal information previously entered into the system, beginning a user security setup, determining if a threshold in the user security setup exceeds a threshold requirement of a vendor security setup, determining if the user is authenticated, and sending requested information to the authenticated user.
Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer
A system and method for signing and authenticating electronic documents using public key cryptography applied by one or more server computer clusters operated in a trustworthy manner, which may act in cooperation with trusted components controlled and operated by the signer. The system employs a presentation authority for presenting an unsigned copy of an electronic document to a signing party and a signature authority for controlling a process for affixing an electronic signature to the unsigned document to create a signed electronic document. The system provides an applet for a signing party's computer that communicates with the signature authority.
Multi-functional authentication apparatus and operating method for the same
A multi-functional authentication apparatus and an operation method for the same are provided. The multi-functional authentication apparatus integrates multiple communication modules into one device. A biometric authentication procedure is firstly performed when activating this multi-functional authentication apparatus. A security code is generated through a security authentication mechanism provided by this apparatus after reading biometric features. After that, according to a connection protocol, one of the communication modules of the multi-functional authentication apparatus is activated to connect with an external host. The security code is transmitted to the host via the communication module for identifying a user. The multi-functional authentication apparatus acts as an authenticator that allows a user to login to a computer system or obtain a network service after authentication. The multi-functional authentication apparatus also provides authentication for the user to open an access control device or conduct a mobile payment.
Detecting of business email compromise
A system for detection of email risk automatically determines that a first party is considered by the system to be trusted by a second party, based on at least one of determining that the first party is on a whitelist and that the first party is in an address book associated with the second party. A message addressed to the second party from a third party is received. A risk determination of the message is performed by determining whether the message comprises a hyperlink and by determining whether a display name of the first party and a display name of third party are the same or that a domain name of the first party and a domain name of the third party are similar, wherein similarity is determined based on having a string distance below a first threshold or being conceptually similar based on a list of conceptually similar character strings. Responsive to determining that the message poses a risk, a security action is automatically performed comprising at least one of marking the message up with a warning, quarantining the message, performing a report generating action comprising including information about the message in a report accessible to an admin of the system, and replacing the hyperlink in the message with a proxy hyperlink.
Digital assistant processing of stacked data structures
Processing stacked data structures is provided. A system receives an input audio signal detected by a sensor of a local computing device, identifies an acoustic signature, and identifies an account corresponding to the signature. The system establishes a session and a profile stack data structure including a first profile layer having policies configured by a third-party device. The system pushes, to the profile stack data structure, a second profile layer retrieved from the account. The system parses the input audio signal to identify a request and a trigger keyword. The system generates, based on the trigger keyword and the second profile layer, a first action data structure compatible with the first profile layer. The system provides the first action data structure for execution. The system disassembles the profile stack data structure to remove the first profile layer or the second profile layer from the profile stack data structure.
Methods, apparatuses, and computer program products for performing identification and authentication by linking mobile device biometric confirmation with third-party mobile device account association
Various embodiments of the present disclosure are directed to providing authentication of access while reducing user input and, specifically to a method, apparatus, and computer program product for receiving device identification information from both a secured system indicating devices with authorization and from a third party telecommunications carrier indicating the mobile device account attempting to access a service provider. Embodiments provided include an apparatus configured to receive, from a mobile device, identification information associated with the mobile device. The apparatus further comprises computing an encrypted hash of the identification information and initiating a search of a registry for a matching entry that matches the encrypted hash of the identification. In an instance when an entry matches the encrypted hash of the identification information, the apparatus further comprises prompting the service provider to grant the mobile device access to one or more services provided by the service provider.
Information processing system, information processing apparatus, and non-transitory computer readable medium storing program
An information processing system includes: a first authentication unit that authenticates a user by a first method; a first providing unit that provides a service to the user authenticated by the first authentication unit; a second authentication unit that authenticates a user by a second method; and a second providing unit that provides a service to the user authenticated by the second authentication unit and also provides a service to the user authenticated by the first authentication unit in a case where the first method satisfies a condition determined according to the second method.
Rule-based dynamic security test system
A website anomaly test is performed by automatically checking that a website has not been compromised by malicious code. A system can test a dynamic behavior of a website that indicates a functional user flow through the website. A set of rules are applied against a log of dynamic behavior of the website, as well as static code of the website, to identify potential compromise by malicious scripts.
Method and apparatus for protected authenticated emergency system halt mechanism for disaster and cyber scenarios
Various methods, apparatuses/systems, and media for implementing an emergency system halt mechanism are disclosed. A processor establishes a communication link with a plurality of data sources and a receiver. The receiver receives data related to disaster and/or cyber scenarios from the plurality of data sources. The processor automatically determines, by utilizing an intelligent activation system (IAS), whether to activate an emergency system halt mechanism (ESHM) upon detection of a disaster and/or a cyber scenario based on analyzing the received data and using pre-determined rules and artificial intelligence (AI)/machine learning (ML) models. The processor also automatically determines whether to activate or deactivate the ESHM based on a result of determination of the IAS. Once activated, a secure voice-based authentication processes designed to work in the limitations of cyber and disaster scenarios allow registered users to take actions such as halt or resume systems.