H04L2463/082

Secure multifactor authentication with push authentication

Improved systems and methods of authenticating a user using a mobile device to access a secure electronic portal are provided. A user may be enabled to quickly and securely log onto a website or other electronic portal using a handheld electronic device. In certain embodiments, multifactor authentication is utilized to improve the security of the authentication process.

CONDITIONALLY-DEFERRED AUTHENTICATION STEPS FOR TIERED AUTHENTICATION
20230038476 · 2023-02-09 ·

Techniques are described herein for using special session identifiers to defer additional authentication steps (AAS) for at least some restricted application actions. A client session is associated with a special session identifier that is mapped to an authentication tier (AT) achieved for the session based on the satisfied authentication steps. Web servers that are enabled for AAS deferral include context information, which identifies a requested action, with session verification requests to an authentication service. The authentication service determines that AAS is required to perform an action when (a) the AT associated with the action is a higher-security tier than the AT associated with the session, or (b) the session is associated with an AT that is lower than the highest-security AT and there is no context information accompanying the request for session validation, in which case the authentication service assumes that the highest-security AT is required to perform the request.

Efficient and secure authentication system

A system and method of establishing a resource provider as a trusted listing are disclosed. The method includes receiving, by a directory server computer, an indication from a user that a resource provider is trusted. The directory server computer is programmed to provide a first level of authentication. The method then includes storing, in a database, data representing the indication from the user that the resource provider is trusted. The method then includes receiving an authentication request message from the user conducting an interaction at the resource provider computer and determining that the data representing the indication from the user that the resource provider is trusted is present. In response to determining, the method includes providing a second level of authentication to the user before the user is allowed to complete the interaction. The second level of authentication is lower than the first level.

Methods for randomized multi-factor authentication with biometrics and devices thereof
11496470 · 2022-11-08 · ·

A method, device and non-transitory computer readable medium for randomized multi-factor authentication with biometrics includes randomly selecting one of a plurality of biometrics in response to a request from a client device. At least the randomly selected biometric is requested from the requesting client device. A match of the requested randomly selected biometric received from the requesting client device against stored biometric information above a set threshold is verified. Access for the request is granted when the verification indicates the match.

Systems and methods for processing electronic requests

Disclosed herein are embodiments of systems, methods, and products comprises a server for efficiently processing electronic requests. The server receives a plurality of predictive computer models and a specification file for each model for registration. The server extracts validation codes for each model based on the specification file. When the server receives an electronic request, the API layer of the server validates the request by verifying the inputs of the request satisfying the validation codes of the corresponding model. If the electronic request is invalid, the server returns an error message immediately; otherwise, the API layer of the server sends the electronic request to the model execution layer. Within the model execution layer, the server executes the corresponding model based on the request inputs and generates output results. The model execution layer transmits the output results back to the API layer, which transmits the output results to the user device.

Service-to-service strong authentication

A request is received from a computing device for substitute data, with access to the substitute data being contingent upon successful multi-factor authentication of the first service. Signature data based on the request is generated using a first key of public-private key pair. Credential proof and the signature is provided to a second service, which verifies the credential proof as a first factor of the multi-factor authentication and verifies, using a second key, the signature as a second factor of the multi-factor authentication. The substitute data is obtained as a result of authentication by the second service. The computing device is caused, by providing the substitute data to the computing device, to input the substitute data into the interface in place of data associated with the first entity.

ELECTRONIC DEVICE FOR PERFORMING DIFFERENT LOGIN PROCESS ACCORDING TO AUTHENTICATION TYPE AND CONTROL METHOD THEREOF
20230042496 · 2023-02-09 ·

Electronic devices perform a login process differently depending on a type of authentication, and control methods are described. Electronic devices may include a communication module and at least one processor. The at least one processor is configured to receive a signal for requesting transmission of user information stored in the electronic device via the communication module from an external electronic device operatively connected to the electronic device. Based on the reception of the signal, first type authentication or second type authentication different from the first type authentication is performed. Information associated with whether the first type authentication is performed or the second type authentication is performed, together with the user information, is transmitted to the external electronic device so that a login process different depending on the first type authentication or the second type authentication is performed in the external electronic device.

Secondary authentication of a user equipment

A user equipment is configured to receive an extensible authentication protocol (EAP) request from a session management function (SMF) that serves as an EAP authenticator for secondary authentication of the user equipment. The secondary authentication is authentication of the user equipment in addition to primary authentication of the user equipment. The user equipment is also configured to, responsive to the EAP request, transmit an EAP response to the SMF.

SECURE CONTENT MANAGEMENT THROUGH AUTHENTICATION
20230096498 · 2023-03-30 ·

Techniques are described herein for performing authentication, and also “eager” or “lazy” fetch of data, for restricted webpages based on the restricted webpages being associated with an authentication tier in an AASD registry. Inclusion of a restricted webpage in the AASD registry enables AASD-based authentication for the webpage. According to embodiments, information for a restricted webpage included in the AASD registry includes one or more of the following for the webpage: an identifier, an authentication level, allowed fields, eager fetch fields, one or more sources for one or more fields, etc. When information for a webpage is included in the AASD registry, that information is used to perform eager fetch for one or more fields of the webpage that are not associated with authentication requirements indicated in the AASD registry information, or whose authentication requirements are already fulfilled by the requesting client.

Automated ID proofing using a random multitude of real-time behavioral biometric samplings
11574045 · 2023-02-07 · ·

A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.