H04L2463/082

Invoking an Automatic Process in a Web-Based Target System Using a Chat-Bot
20230138159 · 2023-05-04 ·

A method, apparatus and product for chat-based application interface for automation. Using a natural language interface, receiving user input. Based on the user input, determining an automation process of a computer program having a user interface (UI), to be executed. The automation process is executed by utilizing the UI to input data thereto or execute functionality thereof. Additionally or alternatively, a conversation to be implemented by a natural language interface may be defined. The conversation is configured to obtain from the user one or more values corresponding to one or more parameters. The conversation is associated with a parameterized automation process depending on the one or more parameters. The parameterized automation process is invoked automatically by a natural language interface and using one or more values provided by the user to the natural language interface for the one or more parameters.

CONTACTLESS CARD PERSONAL IDENTIFICATION SYSTEM

A dual-factor PIN based authentication system and method uses a cryptogram provided by a contactless card associated with the client in association with a PIN stored by the contactless card to authenticate the client. In some embodiments, cryptogram authentication may be preconditioned upon a PIN match determination by the contactless card. In other embodiments, the cryptogram may be formed at least in part using the personal identification number (PIN) stored on the contactless card encoded using a dynamic key stored by the contactless card and uniquely associated with the client. Authentication may be achieved by comparing the cryptogram formed using the PIN against an expected cryptogram generated an expected PIN and an expected dynamic key.

METHOD AND SYSTEM FOR AUTOMATIC AUTHENTICATION AND MANAGEMENT OF OWNERSHIP
20230135973 · 2023-05-04 ·

A method and system for verifying that a user is the owner of a digital listing that is associated with a WiFi Access Point.

The user claims ownership of the WiFi Access Point that is associated with a digital listing of an entity/item/place/business so that he online service provider can verify and register the user as owner of the WiFi Access Point. Once verified, the user owns the WiFi Access Point and its related digital listing and configures the listing. The system includes an item information system receiving the WiFi

Access Point data and associated item data, and storing the WiFi Access Point data and the item data, an owner registration and transfer system receiving owner registration data and ownership change requests and storing the ownership history, and an authentication system receiving authentication requests and generating a response based upon the information stored in the system or a connected system.

Uniquely identifying and securely communicating with an appliance in an uncontrolled network

A service consumer that utilizes a cloud-based access service provided by a service provider has associated therewith a network that is not capable of being controlled by the service provider. An enterprise connector is supported in this uncontrolled network, preferably as an appliance-based solution. According to this disclosure, the enterprise configures an appliance and then deploys it in the uncontrolled network. To this end, an appliance is required to proceed through a multi-stage approval protocol before it is accepted as a “connector” and is thus enabled for secure communication with the service provider. The multiple stages include a “first contact” (back to the service) stage, an undergoing approval stage, a re-generating identity material stage, and a final approved and configured stage. Unless the appliance passes through these stages, the appliance is not permitted to interact with the service as a connector. As an additional aspect, the service provides various protections for addressing scenarios wherein entities masquerade as approved appliances.

USING SENSOR DATA TO AUTHENTICATE A USER
20170372549 · 2017-12-28 ·

It is presented a method for conditionally authenticating a user for access to a physical space. The method is performed in an access control device connected to a physical lock device. The method comprises the steps of: obtaining first sensor data being based on a mobile device sensing a tap of a user; obtaining second sensor data being based on a fixed sensor sensing a tap of a user; determining whether the first sensor data matches the second sensor data by determining whether the first sensor data reflects a tap of the user and corresponds to a tap of the user also reflected in the second sensor data; and sending an unlock signal to the physical lock device when the first sensor data matches the second sensor data.

SCALABLE POLICY BASED EXECUTION OF MULTI-FACTOR AUTHENTICATION

Current approaches to multi-factor authentication lack scalability, among other capabilities and efficiencies. Described herein are methods, devices, and systems that provide for robust and scalable multi-factor authentication using a combination of network-based and device-based authentications. In an example embodiment, a common policy framework enables policy enforcements to be carried out in the network or on the device. As described below, the framework may provide synchronization of policies and authentication results between a network entity and an entity on a user device.

SERVER, IC CARD PROCESSING APPARATUS, AND IC CARD PROCESSING SYSTEM
20170374066 · 2017-12-28 · ·

A server has a communication interface, a database, a biometric authentication means, a password specifying means, and a password transmission means. The database stores information in which, for each registrant, biometric information, identification information of an application and a password are associated with one another. The biometric authentication means is configured to, upon receiving biometric information and identification information of an application from an external processing apparatus, execute biometric authentication by using the received biometric information and biometric information of a registrant registered in the database. If biometric authentication is successful, the password specifying means refers to the database and specifies a password corresponding to the identification information of a successfully authenticated registrant. The password transmission means transmits the specified password to the external processing apparatus via the communication interface.

SELF-ADAPTIVE SECURITY FRAMEWORK

A self-adaptive security framework for a device is disclosed. A first security level for a device is set wherein the first security level comprises procedures that authenticate a user and allow the user to access the device. Input from sensors associated with the device may be received at a contextual sensing engine, wherein the input at least includes location data, and wherein at least a portion of the input is related to a physical setting where the device is located. A threat level for the device is determined in the physical setting via the contextual sensing engine based on analyzing the input. The first security level is altered to a second security level to provide an altered threat response for the device based on the threat level wherein the second security level has different procedures to authenticate the user compared to the first security level.

Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer
09853818 · 2017-12-26 · ·

A system and method for signing and authenticating electronic documents using public key cryptography applied by one or more server computer clusters operated in a trustworthy manner, which may act in cooperation with trusted components controlled and operated by the signer. The system employs a presentation authority for presenting an unsigned copy of an electronic document to a signing party and a signature authority for controlling a process for affixing an electronic signature to the unsigned document to create a signed electronic document. The system provides an applet for a signing party's computer that communicates with the signature authority.

Preventing unauthorized access to secured information systems using authentication tokens and multi-device authentication prompts

Aspects of the disclosure relate to preventing unauthorized access to secured information systems. A computing platform may receive, from an end user desktop computing device, a request to login to a user account associated with a user account portal. In response to receiving the request, the computing platform may generate an authentication token in an authentication database and may send a notification to at least one registered device linked to the user account. After sending the notification, the computing platform may receive, from the at least one registered device, an authentication response message. If the authentication response message indicates that valid authentication input was received, the computing platform may update the authentication token to indicate that the request to login to the user account has been approved. After updating the authentication token, the computing platform may provide, to the end user desktop computing device, access to a portal interface.