H04L2463/082

System and method for device registration and authentication

Systems and methods for device registration and authentication are disclosed. In one embodiment, a method for authentication of a device may include (1) receiving, at a mobile device, a first credential; (2) transmitting, over a network, the first credential to a server; (3) receiving, from the server, a first key and a first value, the first value comprising a receipt for the first credential; (4) receiving, at the mobile device, a data entry for a second credential; (5) generating, by a processor, a second key from the data entry; (6) retrieving, by the mobile device, a third credential using the first key and the second key; (7) signing, by the mobile device, the first value with the third credential; and (8) transmitting, over the network, the signed third value to the server.

Encryption-Based Device Enrollment
20230030230 · 2023-02-02 · ·

One example method includes a device management system detecting an attempt to access a user account by an unenrolled device. The device management system identifies a first enrolled device of the user account by accessing a signature chain of the user account. The device management system facilitates a transmission of a cryptographically-signed enrollment request from the unenrolled device to the first enrolled device. The first enrolled device is configured to cryptographically validate the enrollment request. The first enrolled device is further configured to generate an encrypted attestation message that indicates that the unenrolled device has been authenticated. The unenrolled device can receive and decrypt the encrypted attestation message based on a passcode being displayed on the first enrolled device. The device management system receives a decrypted attestation message from the unenrolled device and updates the signature chain to include a new sequential record for the unenrolled device.

Machine learning for identity access management

A computer readable medium, a system, and a method for providing data security through identity access management using a transaction classifier to classify transactions according to a set of transaction data associated with the transaction and mitigate abnormal transactions. The transaction classifier is trained using a set of training data and updated after each transaction. The identity access management may also include a mitigation policy that is used to determine a mitigation technique for each transaction.

Systems and Methods of Automating Processes for Remote Work
20230037669 · 2023-02-09 ·

A method may include a method of automating processes for remote work. The method may include receiving, at a server, first login data from a client software application. The client software application may be executing on a user device of a remote worker user. The method may include authenticating the remote worker user based on the first login data. The method may include receiving, at the server, command data from the client software application. The command data may include data indicating to the server to launch a software application. The method may include launching, on the server, the software application. The method may include inputting, using a robotic process automation (RPA) process, second login data of the remote worker user into the software application. The method may include key site information, speech-to-text functionality, onboarding functionality, automated support, or activity logging.

Biometric cybersecurity and workflow management
11616777 · 2023-03-28 · ·

A system, method, and media for providing web-based security to a workflow process is presented. Data may be processed in a web-based workflow management system. The system may detect the transfer of high-level security data through the workflow. Upon detection of the data transfers the system may request review and approval in the form of a biometric input from an approved user to allow the data to be transferred.

HIGH SPEED TRUST EVALUATION FOR FILE ACTIVITY
20230032139 · 2023-02-02 ·

Methods and systems for trust evaluation of network activities are provided. An example method commences with receiving, from a user, a request to access at least one file on a network. The method further includes authenticating the user using a multi-factor authentication method. The method continues with selectively granting the user a credentialed access to the at least one file based on the authentication. The method further includes analyzing, based on a security policy, at least one activity of the user. The security policy includes at least one trigger event and at least one mitigating action. The method further includes triggering re-authentication of the user in response to determining, based on the analysis, that the at least one trigger event has occurred. The method then continues with selectively performing the at least one mitigation action based on results of the re-authentication.

Enhanced security access

A mechanism is provided for enhancing security access to a data processing system. Responsive to authenticating a first factor of the multi-factor authentication by matching a scanned fingerprint/thumbprint of a user to at least one previously scanned fingerprint/thumbprint in a set of previously scanned fingerprints/thumbprints, a determination is made as to whether a touch pressure level exerted by the user on a touch pressure sensor associated with the data processing system matches at least one previously stored touch pressure level in a set of previously stored touch pressure levels. Responsive to matching the touch pressure level exerted by the user to a previously stored touch pressure level in the set of previously stored touch pressure levels, a second factor of the multi-factor authentication is authenticated. Access is then granted for the user to the data processing system.

Ground distance determination using zone-based location data

Techniques are provided for ground distance calculations using sanitized location data. One method comprises a service provider obtaining: (i) a geographic zone identifier of multiple predefined geographic zones of a first location of a user, and (ii) a first distance between the first location of the user and multiple reference points that define boundaries of the predefined geographic zones; the service provider obtaining: (i) a geographic zone identifier of the multiple predefined geographic zones of a second location of the user, and (ii) a second distance between the first location of the user and the multiple reference points; and computing a ground distance between the first location and the second location by selecting a subset of the multiple reference points based at least in part on the relative geographic zones of the current and second locations. The user may: (i) estimate the first location and calculate the first distance; and/or (ii) compute the first and second distances.

Multifactor authentication service
11487863 · 2022-11-01 · ·

A system and method for providing multifactor authentication. A disclosed method includes receiving a request at a server to launch a new session for an application on a client device, generating a plurality of codes, each of the plurality of codes associated with a respective identifier, and forwarding the plurality of codes via a short messaging service (SMS) message to a user associated with the client device. The method further includes sending the respective identifier associated with a given code of the plurality of codes to the application and receiving a submitted code entered into the application from the client device. Once received, the method compares the submitted code with the given code associated with the respective identifier and authenticates the user in response to the submitted code matching the given code.

AUTHENTICATION AND AUTHORIZATION METHOD AND APPARATUS
20230087407 · 2023-03-23 · ·

This disclosure provides a method including: A session management network element receives a session establishment request message from a terminal device, where the session establishment request message is used to request to establish a session with a data network. The session management network element determines whether an authentication result of authentication and/or authorization by the data network on the terminal device exists. When determining that the authentication result exists, the session management network element does not initiate a secondary authentication procedure for the session, in other words, skips the secondary authentication procedure. In this disclosure, the session management network element may determine, based on that the data network has authenticated the terminal device, to skip the secondary authentication procedure.