Patent classifications
H04L2463/082
METHODS AND APPARATUSES FOR MANAGING NETWORK SECURITY USING VIDEO SURVEILLANCE AND ACCESS CONTROL SYSTEM
Aspects of the present disclosure include methods and systems for receiving, from a requester, a request for accessing an access-controlled asset based on authentication information of an authorized user, identifying a request location of the request, identifying a current location of the authorized user, determining whether the request location is substantially identical to the current location, and granting the request in response to authenticating the authentication information and determining that the request location is substantially identical to the current location, or denying the request in response to failure to authenticate the authentication information or determining that the request location is different than the current location.
SECONDARY AUTHENTICATION PLATFORM FOR FACILITATING A MULTI-FACTOR AUTHENTICATION AND METHODS FOR USE THEREWITH
A secondary authentication platform operates by: probing an application server to imitate an authentication process associated with a first authentication factor; generating, via a learning function and in response to the probing, authentication pattern data associated with the first authentication factor; monitoring data transmissions from a client device that are directed to the application server; identifying authentication data associated with the first authentication factor in the data transmissions from the client device based on a comparison of the authentication data to the authentication pattern data; communicating with the client device via the network interface to authenticate a user of the client device to the secondary authentication platform via a second authentication factor; and when the user of the client device is authenticated to the secondary authentication platform via the second authentication factor, forwarding the authentication data to the application server to authenticate the user of the client device to the application server via the authentication process associated with the first authentication factor.
SYSTEMS AND METHODS FOR USING MULTI-FACTOR AUTHENTICATION
An authentication computing device stores a cardholder profile that is associated with a candidate cardholder and includes a cardholder identifier, a device identifier, payment account data, and trusted authentication data in a database system, receives an authentication request that is associated with a tax filing of the candidate cardholder and includes a filing identifier from a revenue computing device, detects the authentication request is associated with the candidate cardholder based upon the filing identifier and the cardholder profile, transmits an identity challenge requesting authentication data associated with the candidate cardholder to a user device associated with the device identifier, receives a challenge response including response authentication data from the user device, determines an authentication status associated with the authentication request based on a comparison of the response authentication data and the trusted authentication data, and transmits the authentication status to the revenue computing device.
BEHAVIORAL BASELINING FROM A DATA SOURCE PERSPECTIVE FOR DETECTION OF COMPROMISED USERS
A method and system are disclosed. The method and system include receiving, at a wrapper, a communication and a context associated with the communication from a client. The communication is for a data source. The wrapper includes a dispatcher and a service. The dispatcher receives the communication and is data agnostic. The method and system also include providing the context from the dispatcher to the service. In some embodiments, the method and system use the service to compare the context to a behavioral baseline for the client. The behavioral baseline incorporates a plurality of contexts previously received from the client.
INFORMATION SECURITY USING MULTI-FACTOR AUTHORIZATION
A system includes a central server and one or more user devices connected by a network. The central server receives a request initiated by a user using a user device for a data interaction associated with a data file. The central server checks whether the user is authorized to perform the requested data interaction based on a list of user authorizations. If the user is authorized to perform the data interaction, the central server checks whether the data interaction satisfies at least one rule defined for the user relating to a type of the requested data interaction. If the data interaction satisfies the at least one rule, the central server performs an additional level of authorization to verify an identity of the user. The central server further processes the data interaction when the additional level of authorization is successful.
Multi-Function Data Key
A data key for secure financial and other types of data transactions with a key-shaped case, lightbox touch sensor carrying a removable wafer, processor, secure memory, general-purpose memory, battery, antenna, speaker, microphone, and a dual-purpose USB and chip pin pad. Bluetooth, NFC and/or RFID provides the ability to pair the data key through a wireless channel with another device, such as a smartphone, using a pairing button on the back of the data key. The data key provides chip-and-pin type security to online financial transactions. Dual-device (multi-factor) security requires both the data key and another communication device registered to an authorized user to be present to activate the data key for secure operations. Device pairing enables geo-proximity features, such as dual-device security with a paired device, key finder, phone finder, and panic button. The data key may provide secure, remotely programmable security for building and equipment access.
INTERACTIVE MULTI-FACTOR PHYSICIAN SIGNATURE SYSTEM
A physician order system is disclosed including at least one computing device in operable connection with a network; a memory that stores computer-executable components; a processor that executes the computer-executable components stored in the memory, wherein the computer-executable components may include an application in communication with the computing device, the application comprising at least one module for permitting user access, user function management, user permissions, or data management; and wherein the application is constructed and arranged to permit a physician to execute a physician's order via a multi-factor encrypted compliant digital authentication and to transmit the executed physician's order to a recipient on a network.
MULTIFACTOR AUTHENTICATION THROUGH CRYPTOGRAPHY-ENABLED SMART CARDS
There are provided systems and methods for multifactor authentication through cryptography-enabled smart cards. A user may engage in transactions or other online interactions that may require multifactor authentication, such as by providing a secondary or further piece of evidence or information that is used to more securely trust the user and that they are not another malicious user. The user may utilize a physical card that includes a microchip embedded to a surface, where the microchip includes a key or other cryptographic signing function to be able to be scanned and digitally sign a request for authentication from a computing device. A user's computing device may then be brought into close proximity to the microchip when a request to scan the card's microchip is received. The user's computing device may then use wireless signals to activate the microchip and perform a multifactor authentication.
MACHINE LEARNING FOR IDENTITY ACCESS MANAGEMENT
A computer readable medium, a system, and a method for providing data security through identity access management using a transaction classifier to classify transactions according to a set of transaction data associated with the transaction and mitigate abnormal transactions. The transaction classifier is trained using a set of training data and updated after each transaction. The identity access management may also include a mitigation policy that is used to determine a mitigation technique for each transaction.
Block chain authentication systems and methods
Techniques provided herein relate to registering secondary authentication information with a blockchain. A block chain is stored, having primary authentication information, secondary authentication information, or both that is used in authenticating one or more electronic data action requests provided by a client system to a backend system. The client system, a secondary device, or both registers the secondary device with blockchain node, such that secondary device data is stored as the primary authentication information, the secondary authentication information, or both in the blockchain node.