H04L2463/082

AUTHENTICATION METHOD FOR AUTHENTICATING A USER USING BIOMETRICS AND DIGITIZED HANDWRITTEN SIGNATURE
20230153412 · 2023-05-18 ·

An authentication method is provided for authenticating a user using biometrics and digitized handwritten signature. A user uses a biometric stylus and a handwriting input device to create a handwriting pattern, where the biometric stylus acquires fingerprint data of the user. The handwriting input device transmits the fingerprint data and the handwriting pattern to a verification server. The verification server verifies the handwriting pattern and the fingerprint data, and obtains user identification data for verifying an identity of the user when the handwriting pattern and the fingerprint data are successfully verified.

AUTHENTICATION SCHEME IN A VIRTUAL PRIVATE NETWORK

A method including configuring a first server to receive, from a second server, an encrypted authentication packet to enable the first server and the second server to conduct an authentication process, the encrypted authentication packet including a crypted code field indicating a type associated with the encrypted authentication packet and a crypted payload including one or more encrypted fields; and configuring the first server to transmit, to the second server, a response based at least in part on determining the type associated with the encrypted authentication packet and on decrypting the one or more encrypted fields. Various other aspects are contemplated.

Secure authentication based on passport data stored in a contactless card

Systems, methods, articles of manufacture, and computer-readable media for secure authentication based on passport data stored in a contactless card associated with an account. An application may receive an indication to perform an operation. The application may receive encrypted data from the card. The application may receive an indication that the authentication server verified the encrypted data based on a private key. The application may receive encrypted passport data from the contactless card, the encrypted passport data for a passport associated with the account. The application may determine an attribute of the passport based at least in part on image data or text input. The application may decrypt the encrypted passport data based on the attribute of the passport. The application may initiate performance of the operation based on the received indication specifying that the authentication server verified the encrypted data and the decryption of the encrypted passport data.

Multifactor authentication without a user footprint

Embodiments implement multifactor authentication without a user footprint. An application programming interface call from a client application can be received that includes a messaging identifier. A transaction identifier can be transmitted to the client application and stored. Using a shared secret, a temporary password can be generated, where the shared secret can be associated with the transaction identifier and can be stored. The temporary password can be transmitted to the messaging identifier. A second application programming interface call can be received that includes a reference transaction identifier and input, where a user provides the input to the client application. The user can be authenticated when the reference transaction identifier matches a transaction identifier stored and the input matches an expected password that is based on a stored shared secret associated with the matching stored transaction identifier. A success indicator can be transmitted to the client application based on the authentication.

Systems and methods for authentication and fraud detection

Systems and methods are provided to stop both external and internal fraud, ensure correct actions are being followed, and information is available to fraud teams for investigation. The system includes components that can address: 1) behavioral analytics (ANI reputation, IVR behavior, account activity)—this gives a risk assessment event before a call gets to an agent; 2) fraud detection—the ability to identify, in real time, if a caller is part of a fraudster cohort' and alert the agent and escalate to the fraud team; 3) identity authentication—the ability to identify through natural language if the caller is who they say they are; and 4) two factor authentication—the ability to send a text message to the caller and automatically process the response and create a case in the event of suspected fraud.

ADAPTIVE NETWORK ATTACK PREDICTION SYSTEM

Machine-learning (ML) techniques and models are described for predicting the number and severity of network attacks within a specified timeframe, such as the next fifteen minutes. In some embodiments, the techniques including training a ML model based on features extracted from a training dataset and applying the trained ML model to estimate (a) the probability of an attack happening on an account within a specified timeframe; (b) how many attacks are predicted to occur in the specified timeframe (if any); and/or (c) the severity of the attacks predicted to occur. A system may deploy preventative measures based on the ML model output to counter or mitigate the effects of predicted and coordinated network attacks.

System, Method, and Apparatus for Authenticating a User Device

Provided is a method, system, and apparatus for authenticating a user device. The method includes registering a device identifier with at least one transformation rule, receiving a request for authentication comprising a device identifier associated with a user device, obtaining a one-time password (OTP) in response to receiving the request, communicating the OTP to the user device, receiving a transformed OTP from the user device, and authenticating the user device based on the OTP, the transformed OTP, and the at least one transformation rule.

METHOD FOR AUTHENTICATING A USER USING BIOMETRICS AND DIGITIZED HANDWRITTEN SIGNATURE, AND SYSTEM IMPLEMENTING THE SAME
20230141242 · 2023-05-11 ·

A method for authenticating a user using biometrics and digitized handwritten signature is provided. A biometric stylus performs fingerprint recognition on the user who uses the biometric stylus to create a handwriting pattern on a handwriting input device, and transmits encrypted identification data to the handwriting input device when the fingerprint recognition is successful. The handwriting input device transmits the encrypted identification data and the handwriting pattern to a verification server. The verification server verifies the handwriting pattern, and decrypts the encrypted identification data for verifying an identity of the user when the handwriting pattern is successfully verified.

System and method for authenticating a user at a user application using an credential access application and automatically redirecting to a target application

A credential accessing system includes an interface and a processor. The interface is configured to receive a request to access a credential using a credential access application. The processor is configured to execute the credential access application in response to a request from a user application, wherein the request from the user application comprises an indication of a target application. Executing the credential access application comprises:1) receiving an indication of interactive control, wherein interactive control is redirected from the user application, and wherein the indication of interactive control comprises the indication to access the credential; 2) determine whether to allow access to the credential; and 3) in response to determining to allow access to the credential, access the credential and provide the credential to the target application; and 4) indicate to redirect interactive control to the target application.

Second factor for secure password authentication

At an authorization server, a shared secret electronic key may be shared with a second computer. A selection to use a system to complete a transaction may be received from a first computing device. An image may be communicated to the first computing device. A digital representation entered by the user representing the image and a PIN based on the copy of the shared electronic key may be received from the second computing device. The system and method may determine if the digital representation entered by the user on the second computing device matches the image communicated to the first computing device. The system and method may determine if the PIN based on the copy of the shared electronic key from the second computing device is as expected. In response to determining the digital representation entered by the user matches the image and the PIN the second computing device is as expected, the user may be authorized.