H04L2463/082

DIGITAL KEY DEVICE AND METHOD FOR ACTIVATING DIGITAL KEY SERVICE
20220337426 · 2022-10-20 ·

A digital key service device includes a casing, an input device, a data storage unit and a controlling unit. The input device is disposed near the casing or mounted on the casing, and configured to receive a user operation input. The data storage unit is disposed in the casing, and configured to store digital data and a digital key. The controlling unit is disposed in the casing, and configured to use the digital key to perform a digital key service or output the digital data to a host when authentication is complete. The authentication includes an operation verification procedure for verifying the user operation input. The authentication is complete when the controlling unit determines that the user operation input conforms to a preset timing-based input set.

Mobile device with secure private memory

A mobile device includes non-private memory that can store software programs and a private memory that can store copies of the software programs as well as exclusively store trusted programs that are not stored in the non-private memory. The mobile device includes a processor configured to execute the software programs of the non-private memory when the mobile device is in a non-private mode, execute a trusted program only when the mobile device is in a private mode, and enable switching between the non-private mode and the private mode in response to a reboot of the mobile device.

Method and system for contextual access control

Described embodiments provide systems and methods for contextual confidence scoring-based access control. The systems and methods can include one or more processors configured to receive a request from the client device to access an item of content. The one or more processors can select a first subset of authentication techniques. The authentication techniques identifiable with a score. The one or more processors can determine that a sum of the scores of the selected first subset of the authentication techniques exceeds a threshold. The one or more processors can transmit, to the client device, one or more authentication requests utilizing the selected first subset of authentication techniques. The one or more processors can provide, responsive to successful authentication by the client device, access to the item of content to the client device.

SECURE DOCUMENT STORAGE SYSTEM
20230107135 · 2023-04-06 · ·

A system is provided for the storage of data, the system having: an encrypted host platform upon which regulatory controlled data is stored; a controller configured to allow a primary user to set permission settings and identify authorized end users and degrees of access granted to each the authorized end user, the authorized end user being pre-cleared for compliance with regulatory controls pertaining to the regulatory controlled data; the controller configured to permit access to the encrypted host platform only if the hosting platform is in compliance with predefined data security protocols the controller configured to allow the authorized end user access to the regulatory controlled data, and the controller configured to exclude access to both a provider of the system for storage and a system host platform provider; at least one individual computing device accessible by at least one the authorized end user, the individual computing device configured to provide authorized end user identification data to the controller and receive permissions from the controller for access to the host platform; and the host platform only communicates with individual user devices if the devices have received permission from the controller.

Dynamic risk detection and mitigation of compromised customer log-in credentials
11621953 · 2023-04-04 · ·

This invention relates to a process for detecting and mitigating risk generated when a customer's log-in credentials are compromised. A significant majority of stolen credentials and customer's personally identifiable information data eventually make their way to the dark web. By dynamically monitoring the dark web and combining the analysis with related information about the user and their credentials on the deep web and the surface web, through a machine learning model, a service provider pre-emptively or otherwise can act to mitigate the risk arising from such compromise of said customer log-in credentials.

TOKENIZED IDENTIFICATION ISSUANCE FOR SECURE DISCRETIZED NETWORK COMMUNICATION CHANNEL

A system includes a system server programmed to receive a mobile number of a mobile device, associate the mobile number with a mailbox, and provide, in exchange for the mobile number, a mailbox address for the mailbox. The system also includes a mailbox server programmed to provide the mailbox and receive a set of electronic messages addressed to the mailbox address. The system also includes a secure channel to communicate with an application on the mobile device. The secure channel is secured using the mobile number. The system server is further programmed to extract content from the set of electronic messages to obtain extracted content and transmit the extracted content to the application via the secure channel.

IDENTITY VERIFICATION FOR NETWORK ACCESS

This disclosure describes techniques for authentication related to verification of identity for network access. The techniques may include sending a challenge associated with authentication to a network to a mobile device. In response to sending the challenge, the techniques may include receiving a challenge response from the mobile device. The challenge response may include biometric credential information associated with a user of the mobile device. The challenge response may also include an indication of an authorization assertion associated with the authentication to the network. In some examples, the techniques may include tailoring access to the network for the mobile device based on the biometric credential information.

FRICTIONLESS SUPPLEMENTARY MULTI-FACTOR AUTHENTICATION FOR SENSITIVE TRANSACTIONS WITHIN AN APPLICATION SESSION

The present technology includes applying a security policy by an application security system to a transaction within an application that is monitored by the application security system. The present technology includes monitoring transaction occurring between a client device an application over a network. The present technology also includes identifying a first transaction from the transactions as a sensitive transaction. The sensitive transaction is associated with an authentication policy requiring an authentication. The present technology also includes interrupting the application. The present technology also includes prompting the client device for the authentication.

INFORMATION SECURITY USING BEHAVIOR-BASED AUTHENTICATION

A device that is configured to receive an authentication request for a first user. The authentication request includes a first authentication fingerprint and a first vital sign information. The device is further configured to identify a second authentication fingerprint from a memory that matches the first authentication fingerprint and to identify a second vital sign information that is associated with the second authentication fingerprint. The device is further configured to compare the first vital sign information from the authentication request to a tolerance threshold value. The device is further configured to generate an authentication response based on the comparison and to send the authentication response to a network device.

SYSTEMS AND METHODS FOR TRUSTWORTHY ELECTRONIC AUTHENTICATION USING A COMPUTING DEVICE
20230155812 · 2023-05-18 ·

A method, system, and digital recording medium provides for convenient and trustworthy user authentication with a computing device combining four authentication factors through use of a remote authentication system (RAS). An identity token (Device-ID) cryptographically bound to the user's computing device is generated as a first authentication factor. A password known only to the user is a second factor. Cryptographic signatures generated from the user's biometric minutiae is a third factor. A random challenge received from the RAS is a fourth factor. An encryption key-generation key is created cryptographically using the Device-ID and stored locally, which together with the user's cryptographic signatures are encrypted with a one-time-pad encryption key obtained from the RAS on a communication channel different from that used for other communication between the device and the RAS to provide perfect secrecy, then transmitted from the device to the RAS on a connection therebetween to register said shared-secrets.