Patent classifications
H04L2463/082
SYSTEMS AND METHODS FOR MULTI-FACTOR LOCATION-BASED DEVICE VERIFICATION
A system for multi-factor location-based device verification is configured to receive a first location factor, which may include GPS data, from a client device. The system is also configured to receive one or more additional location factors, such as a second location factor and/or a third location factor, from first and/or second wireless beacons, respectively. The wireless beacons may be located within a predefined area, such as a sports book or another casino area, and the system may determine, based upon the one or more location factors, whether the client device is within the predefined area. As a result, the location of the client device may be verified based upon one or more location factors. In addition, in response to verifying the location of the client device, a new wagering account may be established and/or wagering may be initiated.
USING PROOF OF PURCHASE FOR MULTIFACTOR AUTHENTICATION
Multifactor authentication techniques described herein may allow a user to submit a recent proof of purchase as a part of a multifactor authentication process to access an account associated with a financial institution. As part of the login process, the user may submit a proof of purchase associated with a transaction. The financial institution may determine information associated with the transaction, such as a merchant associated with the proof of purchase, a time of the transaction, the last four numbers of the transaction card used, a dollar amount, or any combination thereof. If the information matches one or more records in the transaction history of the user's account, the financial institution may authenticate the user and provide access to the account. In this way, the financial institution may leverage transaction history known to the financial institution and the user to authenticate the user.
Methods and systems for multiple channel authentication
Methods and systems for multiple channel authentication are described. In one embodiment, a request for an interaction is initiated from within a mobile application. The request may include authentication information and contextual information relating to a current exchange between the mobile application and an organization. The user may be authenticated with the authentication information and the request may be routed to a representative based on the contextual information to continue the exchange.
Conversational authentication
Techniques are disclosed relating to contextual authentication across different applications based on user communications. In some embodiments, a user is preauthenticated to certain actions on a second application based on the user's communication via a first application. The user's communication via a first application provides contextual information that may be used to preauthenticate a request to perform an action on the second application. Contextual information may include the user's communication itself, communications characteristics that are determined from the user's communications, or both. In some embodiments, the degree of preauthentication progressively increases or decreases with the degree of use on the first application; that is, the user is preauthenticated to greater or fewer portions of an authentication procedure, to perform greater or fewer actions, or to perform actions more or less critical to security, as additional information regarding the user's communication on the first application becomes available. In some embodiments, preauthentication may be revoked as additional contextual information becomes available on the first application.
Systems and methods for authenticating a user at a public terminal
Systems and methods for authenticating a user to access a public terminal are described. Disclosed embodiments may include reading, using the physical credential reader, a user identifier from the physical credential device. Disclosed embodiments may also include transmitting the public terminal identifier and the user identifier to a secure server. Further, disclosed embodiments may include receiving, after completing the transmission, a unique code from the secure server. Disclose embodiments may additionally include displaying the unique code on the display device. Disclosed embodiments may include receiving, after displaying the unique code, an authentication message from the secure server. Disclosed embodiments may further include, responsive to receiving the authentication message, authorizing the user to use a terminal command at the public terminal.
Facilitating automating home control
Systems, computer-implemented methods and/or computer program products that facilitate automating home control are provided. In one embodiment a computer-implemented method comprises: using a voice recognition component to identify user identification by analyzing voice signatures; using a face recognition component to determine user identification by analyzing facial features; using an authentication component to verify user identification and authorize control access to functionality of one or more automated home control systems; using a communication component to facilitate communication between the one or more automated home control systems and one or more devices; using a service component to execute a set of functions based on authorized user commands and information communicated from the one or more devices; and using a machine learning component to learn user preferences by correlating a set of functions with the authorized users commands.
Systems and methods for multi-device multi-factor authentication
Systems and methods for improved security authentication are disclosed. In some embodiments, an improved system for security authentication may include a plurality of computing devices, and a server system communicatively coupled to the plurality of computing devices. The server system may be configured to receive a request for security authentication, determine an authorization providing computing device from among the plurality of computer devices based on authentication preferences stored in a database communicatively coupled to the server system, generate and transmit authentication information to the determined authorization providing computing device, receive, from an initiating computing device an authentication input, determine whether the received authentication input matches the transmitted authentication information, and complete the request for security authentication when the received authentication input matches the generated and transmitted authentication information.
Systems and methods of authentication using vehicle data
Multi-factor authentication systems and methods are provided that include receiving a request to authenticate a user of a mobile device. The request for authentication may include credential information associated with the user and vehicle data. A determination may be made regarding whether the vehicle data was obtained from a vehicle via the mobile device. The received vehicle data and received credential information may be compared to stored data. When there is a match between the received vehicle data and received credential information and corresponding stored data, a notification may be provided to the user device, indicating that the user has been authenticated.
Methods and systems for securely accessing and managing aggregated submarine cable system information
Aggregated, submarine cable system information is securely stored, accessed and managed. Security is assured through the use of multi-factor authentication that is compliant with National Institutes of Standards And Technology and US. Government Defense Federal Acquisition Regulation requirements. Further, real-time audit logs are generated as end-users access controlled unclassified information.
MULTIFACTOR AUTHENTICATION PROCESSING USING TWO OR MORE DEVICES
A first user request may be received to access a particular resource. A first authentication credential from a first client device may be received based on a first authentication challenge being issued to a user of the first client device. A second client device of the user may be notified to prompt the user to provide a second authentication credential to complete at least a second authentication challenge. The access to the particular resource may require at least successfully completing the first authentication challenge on the first client device and the second authentication challenge on the second client device.