Patent classifications
H04L2463/082
POLICY ENFORCEMENT FOR DATA SOURCES ACCESSED VIA INTERFACES
A method is described. The method includes receiving a communication including a command for a data source accessed via an interface. The interface is a data source agnostic platform and is capable of decoupling execution of the commands for the data source from a current session. The method also includes generating an augmented communication including the command and dynamically injected code for enforcing at least one policy. The augmented communication is provided to the interface. The interface enforces policies in response to the dynamically injected code in the augmented communication being executed by the interface.
SYSTEM AND METHOD FOR MULTIFACTOR AUTHENTICATION FOR ACCESS TO A RESOURCE BASED ON CO-CONNECTED DEVICE PRESENCE
Systems, computer program products, and methods are described herein for multifactor authentication system that determines co-connected device presence for added security. The system utilizes a device fingerprint for each device. The device fingerprint may contain a library of interconnected devices, as well as ambient noise from the device. The device fingerprint will be used to determine confidence levels indicating whether the devices are in the same location and thus in operation by the same user during multifactor authentication.
UNIVERSAL, HIERARCHALLY-OUTSOURCED MULTI-PHASED AUTHENTICATION FRAMEWORK WITH A CENTRAL GLOBAL DATABASE
UNIVERSAL, HIERARCHALLY-OUTSOURCED MULTI-PHASED AUTHENTICATION FRAMEWORK WITH A CENTRAL GLOBAL DATABASE
Systems and methods for secure logon
The present disclosure provides methods and systems for secure logon. One or more method includes: determining, via authentication information provided by a user of an electronic device, that the user is authorized to access an online account provided by the online account provider; providing the user with a selectable option to enable an expedited logon process by which the user can access the online account by solely providing a particular authentication item of the user; receiving a verification credential in response to a next logon attempt using the expedited logon process; and verifying that the received verification credential matches an assigned verification credential provided to the user for use in conjunction with the next logon attempt using the expedited logon process.
Highly secure networked system and methods for storage, processing, and transmission of sensitive personal information
A highly secure networked system and methods for storage, processing, and transmission of sensitive information are described. Sensitive, e.g. personal/private, information is cleansed, salted, and hashed by data contributor computing environments. Cleansing, salting, and hashing by multiple data contributor computing environments occurs using the same processes to ensure output hashed values are consistent across multiple sources. The hashed sensitive information is hashed a second time by a secure facility computing environment. The second hashing of the data involves a private salt inaccessible to third parties. The second hashed data is linked to previously hashed data (when possible) and assigned a unique ID. Prior to a data dictionary being accessible by a researcher computing device, the data dictionary undergoes compliance and statistical analyses regarding potential re-identification of the source unhashed data. The data dictionaries are viewable by researchers as certified views via a secure VPN.
MESSAGE DELIVERY IN CELLULAR ROAMING SCENARIOS
Message delivery in cellular roaming scenarios involves a user device activated with a home telecommunications service provider (TSP) that provides cellular service to the user device. The user device is located in a remote location and the user device is activated with a remote TSP providing roaming cellular service to the user device in a remote location on a cellular network of the remote TSP. A process includes, based on the user initiating a transaction with a remote application server that requires user authentication based on delivery of a transactional text message, receiving from the remote application server the transactional text message, encrypting the transactional text message to produce an encrypted transactional text message, and forwarding the encrypted transactional text message to the remote TSP for delivery as a short message service (SMS) text to the user device in the remote location via the cellular network of the remote TSP.
METHODS AND APPARATUS FOR AUTOMATED MULTI-FACTOR AUTHENTICATION
A server performed method includes receiving, from a first device, a request for authentication by the server, wherein the request includes a unique identifier of the first device, and upon verifying that the unique identifier is registered at the server, sending a push notification to the first device and to a second device registered as associated with the first device. A first list of IDs of at least one wireless device within wireless communication range of the first device is received from the first device, and a second list of IDs of at least one wireless device within wireless communication range of the second device is received from the second device. The first and second list of IDs are compared to identify common IDs between the first list and the second list. Successful authentication of the first device is confirmed when at least one common ID is identified.
End-to-end verifiable multi-factor authentication service
An end-to-end verifiable multi-factor authentication scheme uses an authentication service. An authentication request is received from an organization, the request having been generated at the organization in response to receipt there of an access request from a user. The user has an associated public-private key pair. The organization provides the authentication request together with a first nonce. In response to receiving the authentication request and the first nonce, the authentication service generates a second nonce, and then it send the first and second nonces to the user. Thereafter, the service receives a data string, the data string having been generated by the client applying its private key over the first and second nonces. Using the user's public key, the service attempts to verify that the data string includes the first and second nonces. If it does, the authentication service provides the authentication decision in response to the authentication request, together with a proof that the user approved the authentication request.
CONTINUOUS MULTIFACTOR AUTHENTICATION SYSTEM INTEGRATION WITH CORPORATE SECURITY SYSTEMS
The present technology pertains to increasing security of devices that leverages an integration of an authentication system with at least one corporate service. The present technology includes receiving a request from a user device to authenticate a person as a particular user by the authentication system. The present technology also includes capturing a photo of the person attempting to be authenticated as the particular user. The present technology also includes mapping nodal points to the captured photo of the person attempting to be authenticated as the particular user to a device or service. The present technology also includes comparing the nodal points from the photo against a reference model for facial recognition of the particular user. The present technology also includes determining that the nodal points do not sufficiently match the reference model for the particular user. The present technology also includes sending a command to the user device to send data to identify the person, and/or a location of the user device.
SYSTEMS AND METHODS FOR EMERGENCY DATA INTEGRATION
A disclosed apparatus obtains emergency data for multiple device types from a plurality of emergency data sources and provides a jurisdictional map view to a plurality of emergency network entities, where each emergency network entity corresponds to a given geographic boundary. The jurisdictional map view corresponds to a respective emergency network entity's geographic boundary. The apparatus determines portions of the emergency data corresponding to emergencies occurring within each respective emergency network entity geographic boundary, and provides location indicators within each respective jurisdictional map view, with each location indicator corresponding to an emergency.