Patent classifications
H04L2463/082
Local and Remote Access Apparatus and System for Password Storage and management
The present invention is maser credentials' storage and management system installed on the local network consisting of a secured depository of usernames and passwords which ran be locally/remotely accessed only by the user after authentication. The user account contains all user credentials' which are stored in a device connected to local network. The user credentials' are stored in a device, which can be accessed by the user via WiFi/Ethernet/etc. The server provides the first level of authentication which connects the user post authentication by computing device to the storage device. The user has to run the required web page, after which the application accesses the user credentials' account, extracts the login credentials and automatically fills or can be manually filled in the appropriate fields. In the case of accessing multiple accounts, then the user credentials; can be copy-pasted from them account and can terminate the session.
Global Approach for Multifactor Authentication Incorporating User and Enterprise Preferences
A system and method for a global approach for multifactor authentication incorporating user and enterprise preferences. An example method includes receiving a request from an enterprise computer for authentication of a user to access a resource of the enterprise. The example method also includes requesting available authentication methods and/or credentials at a point of authentication for the user. The example method also includes determining a set of authentication credentials to apply. The example method also includes receiving a requested set of authentication credentials from the point of authentication. The example method also includes authenticating the user based on the received set of authentication credentials from the point of authentication, and providing the user authenticated identity to the enterprise for access to the resource of the enterprise after authenticating the user.
SYSTEMS AND METHODS FOR BIOMETRIC AIDED NETWORK ACCESS CONTROL
Various embodiments discussed generally relate to network security, and more particularly to systems and methods for using biometric data to enhance security in network access authorization.
Multi-Level Authentication Security Service
A method for authenticating a user by a wireless service provider security service. The method comprises receiving a multi-level authentication request from a security client, performing first-layer authentication including determining whether values of user identifier (ID) and password from the security client match user ID and password values stored by the network application and associated with the user’s network subscriber identifier, performing second-layer authentication including determining whether a response code value from the security client matches a generated code value sent to the security client, performing third-layer authentication including determining whether a radio access network (RAN) attach credential from the security client matches a RAN attach credential stored by the wireless service provider and associated with the network subscriber identifier, and sending the security client an authentication response that confirms authentication of the user based on successful authentication at all three layers, and denies authentication of the user otherwise.
REMOTE CONTROLLED LED BASED ID EMITTER AND DEPLOYMENT, AND APPLICATION OF SAME TO MULTI-FACTOR AUTHENTICATION
An apparatus includes a luminaire; power input for the luminaire; a modulation circuit for modulating the power input so that light output includes an identifier of the luminaire; and a programmable memory for storing at least one of the identifier of the luminaire and a modulation scheme for modulation of the luminaire to place a signal on the light. A method for modulating light includes storing in programmable memory an identifier for the luminaire, the identifier being used to modulate the light, and/or a modulation scheme for modulation of the luminaire; and changing content of programmable memory to change the identifier and/or the modulation scheme. A method of efficiently deploying the luminaires and identifying their locations to a network is disclosed. A method of multi-factor authentication using authentication data transmitted by modulating the light emitted by a luminaire is also disclosed.
EXTENSIBLE, LOW-CODE INTEGRATION PLATFORM
Integrated system enables implementors to integrate functionality into software systems to enable user identity and access management across customers/products. Management platform enables a pool of accounts/technical components representing users/machines to be authenticated against systems/products, authenticated accounts/technical components to perform functions within systems/products, representations of external software systems as products to be mapped to identities, accesses, organizations, and permissions, and representation of groups of accounts organized by a common aspect where the groups can request access to products licensed by the groups. Multi-factor authentication module enables various third-party technologies to lend MFA functionality to the management platform and the users. Product license purchase module enables an entity external to the implementor and represented by an organization to request and gain access to products in a formalized manner. Data stream ecosystem enables the implementor to define data streams and connect systems to the data streams to move data packets between the systems.
LOCAL AUTHENTICATION
In accordance with an example aspect of the present invention, there is provided an apparatus comprising at least one processing core and at least one memory including computer program code, the at least one memory and the computer program code being configured to, with the at least one processing core, cause the apparatus at least to obtain a first sensor output from a first sensor, receive from a second apparatus a first received sensor output and compare the first sensor output to the first received sensor output, and responsive to the outputs matching, grant a first level of access to the second apparatus.
MOBILE ELECTRONIC DEVICE, SECURITY CONTROL METHOD, AND SECURITY CONTROL CODE
A mobile electronic device includes a first input unit configured to receive input of information for cancelling a security lock state in which security lock is effective, a second input unit configured to receive input of biological information for cancelling the security lock state, and a controller configured to set a sleeping-time operation control mode corresponding to a sleeping time of a user according to an operation of the user.
TWO-FACTOR AUTHENTICATION
Systems, methods, and computer-readable storage media are provided for authenticating users to secure services or apps utilizing reversed, hands-free and/or continuous two-factor authentication. When a user desires to access a secure service or app for which s/he is already registered, the user, having a registered mobile computing device in proximity to his or her presence, comes within a threshold distance of a computing device that includes the desired secure service or app. The computing device authenticates the particular mobile computing device as associated with the particular registered user that utilized that mobile device during registration. Subsequent to such device authentication, the user is able to login to the service or app by simply providing his or her user credentials at a login form associated therewith. Two-factor authentication in accordance with embodiments hereof is more secure and more efficient that traditional authentication methodologies.
Secure multi-factor user authentication on disconnected mobile devices
Embodiments described herein disclose a mobile device system for providing access to a subset of data within an application executed by the mobile device. During a first time period, when the mobile device is connected to a network, authentication information corresponding to a user account with a payment services provider is received. A biometric authentication signature and password are received in response to a request to enable access to a subset of data associated with the account. The subset of data is encrypted with a key generated from the biometric signature and password and stored. At a second time period, when the mobile device is disconnected from a network, the subset of data is decrypted using a key generated from an entered biometric signature and password.