H04L2463/082

Device-Side Federated Machine Learning Computer System Architecture

Techniques are disclosed in which a computer system receives a transaction request and uses a federated machine learning model to analyze the transaction request. A server computer system may generate a federated machine learning model and distribute portions of the federated machine learning models to other components of the computer system including a user device and/or edge servers. In various embodiments, various components of the computer system apply transaction request evaluation factors to the portions of the federated machine learning model to generate scores. The server computer system uses the scores to determine a response to the transaction request.

Invoking an automatic process in a web-based target system using a chat-bot
11558317 · 2023-01-17 · ·

A method, apparatus and product for chat-based application interface for automation. Using a natural language interface, receiving user input. Based on the user input, determining an automation process of a computer program having a user interface (UI), to be executed. The automation process is executed by utilizing the UI to input data thereto or execute functionality thereof. Additionally or alternatively, a conversation to be implemented by a natural language interface may be defined. The conversation is configured to obtain from the user one or more values corresponding to one or more parameters. The conversation is associated with a parameterized automation process depending on the one or more parameters. The parameterized automation process is invoked automatically by a natural language interface and using one or more values provided by the user to the natural language interface for the one or more parameters.

TRANSACTION AUTHENTICATION METHOD, SERVER AND SYSTEM USING TWO COMMUNICATION CHANNELS

A transaction method for a user using a first and a second terminal and connected to a server via a first and a second communication channel, respectively. The first terminal sends a transaction amount to the server. The server establishes a verification code whose length depends on the transaction amount, then sends a request to the first terminal and the verification code to the second terminal. The user returns the request filled in with a copied code to the server using the first terminal. The server compares the verification code with the copied code and sends a transaction validation or invalidation message to the first terminal depending on the comparison.

Gesture-extracted passwords for authenticated key exchange

A method for gesture-based multi-factor authentication includes mapping a gesture password to a first substitution string, generating a cryptographic key using the first substitution string as an input to a password authenticated key exchange protocol, encrypting a challenge response with the cryptographic key to generate an encrypted challenge response, and transmitting, to a relying party computing system, a first authentication message comprising the encrypted challenge response and a user identifier identifying a user.

SINGLE METHOD FOR BLOCKING ACCESS THREATS USING VIRTUALIZATION TECHNOLOGY IN CLIENT-SERVER APPLICATIONS
20230038466 · 2023-02-09 ·

A method for providing a software based secure, robust, flexible, usable, and auditable single method that can practically eliminate threat occurring from phishing, man-in-middle theft, pharming/channel redirection, piggybacking of spyware, and application modification in client applications. These can be very strongly achieved using dynamic virtualization technology. This virtualization technology entirely protects applications from such threats is by creating highly dynamic virtual images of real data that are private, relative, one-time use, and short-lived. These virtual images are strongly made private and relative by creating virtual device id of the client device, virtual application signature of the client application, virtual private network of the network and virtual certificate of the server.

Methods and apparatuses for defining authorization rules for peripheral devices based on peripheral device categorization

Method, apparatus and computer program product for detecting vulnerability in an industrial control system, predicting maintenance in an industrial control system, and defining authorization rules for peripheral devices based on peripheral device categorization are described herein.

Information security system and method for multi-factor authentication for ATMS using authentication media

A system for verifying a user operating an Automated Teller Machine (ATM) sends an authentication media item to a user device associated with the user when the ATM receives a transaction request. The system receives, from the ATM, a first image of the authentication media item when the authentication media item is presented to the ATM. The system compares the first image of the authentication media item with a second image of the authentication media item stored in a user profile associated with the user. The system extracts a first unique code from the first image of the authentication media item, and a second unique code from the second image of the authentication media item. The system determines whether the first unique code corresponds to the second unique code. The system approves the transaction request if it is determined that the first unique code corresponds to the second unique code.

Efficient transfer of authentication credentials between client devices

An authentication system facilitates a transfer of enrollment in authentication services between client devices. The authentication system enrolls a client device in authentication services to enable the client device to be used for authenticating requests to access one or more services. As part of enrolling the client device, the authentication system receives authentication enrollment information for the client device that is associated with one or more authentication credentials securely stored on the client device (e.g., a multi-factor authentication (MFA) certificate). The authentication system facilitates one or more processes for transferring the enrollment from an enrolled client device to a non-enrolled client device that limit the number and complexity of actions performed by the user. In particular, the authentication system facilitates transfer of enrollment based on receiving enrollment transfer requests authorized by the enrolled client device using one or more authentication credentials associated with the enrollment of the enrolled client device.

EVENT DRIVEN SECOND FACTOR CREDENTIAL AUTHENTICATION
20180007041 · 2018-01-04 ·

A reader configured to perform dual-factor authentication is provided. The reader is configured to analyze credential data as well as event-based user inputs. The event-based user inputs are received in response to the reader presenting one or more events to a user and monitoring the user's reaction thereto. Utilization of an event-based user input enables the reader to perform dual-factor authentication without necessarily being provided with a keyboard or other advanced user input device.

AUTHENTICATION METHOD
20180004925 · 2018-01-04 ·

An authentication method. The method comprises comparing user voice data received via an electronic device to a stored voice template to determine a voice authentication parameter. A voice authentication threshold is determined and the voice authentication parameter is compared to the voice authentication threshold to determine whether to authenticate the user. Determining the voice authentication threshold comprises determining a current value of an enrolment counter, then comparing the current value of the enrolment counter to an enrolment counter threshold and determining whether the stored voice template is fully enrolled according to the result. If the stored voice template is fully enrolled, the voice authentication threshold is set to a first voice authentication threshold. If the stored voice template is not fully enrolled then a device attribute received from the electronic device is compared to a stored device attribute. If the received device attribute matches the stored device attribute, the voice authentication threshold is set to a second voice authentication threshold determined by the current value of the enrolment counter. If the received device attribute does not match the stored device attribute, the voice authentication threshold is set to a third voice authentication threshold.