H04L2463/082

CALL ORIGINATION VALIDATION FOR INCOMING CALLS WITHIN A WIRELESS COMMUNICATION NETWORK
20220368799 · 2022-11-17 ·

A computer-implemented method for validating the origination of an incoming customer call on a wireless communication network may include receiving a SIP invite message at the wireless communication network when the call is initiated, determining whether the SIP invite message includes one or more indicators indicating that the call originated within the wireless communication network from a device with a SIM registered in the wireless communication network, and writing a classification code to a database indicating that the call is validated if the SIP invite message includes the one or more indicators. The method may further include receiving the call at an agent computer device with caller identification information, querying the database via the agent computer device according to the caller identification information to obtain the classification code of the customer call, and suppressing a step used for call authentication if the classification code indicates that the call is validated.

MULTIFACTOR PRIVACY-ENHANCED REMOTE IDENTIFICATION USING A RICH CREDENTIAL

A method and system are provided for multifactor identification of a subject over a network using a rich credential, with selective disclosure of attributes and selective presentation of verification factors. A credential presentation application negotiates with a verifying server to agree on attributes to be disclosed and verification factors to be presented, and removes unneeded attributes and verification data from the rich credential by pruning subtrees from a typed hash tree without invalidating a signature that covers the root label of the tree. The credential presentation application proves knowledge of a private key, and as agreed upon may prove knowledge of a password and may arrange for biometric presentation applications to present one or more biometric samples to the verifier, which performs presentation attack detection and verifies the samples against verification data in the rich credential.

ADVANCED APPLICATION SECURITY UTILIZING AN APPLICATION KEY
20170339127 · 2017-11-23 ·

Embodiments of the invention provide a method, system and computer program product for advanced application authentication utilizing an application key. In a method of the invention, an end user provides in a single user interface screen for authenticating into an application, each of a user identification, password and an application key. Thereafter, the application key is validated in connection with the user identification. If the application key validates in connection with the user identification, one or more application parameters for the application necessary to complete a log-in process are retrieved and the end user is authenticated into the application utilizing each of the user identification, password and application parameters so as to complete the log in process for the end user and the application and the end user is granted the ability to utilize the application.

Method for carrying out a two-factor authentication

The invention relates to a method for carrying out a two-factor authentication between a client and a relying party, wherein, as the second factor, a data carrier is employed which carries out a communication with a token server.

Automation process definition for a natural language interface
11258732 · 2022-02-22 · ·

A method, apparatus and product for defining an automation process to be invoked in response to a conversation of a user with a natural language interface. A conversation that is configured to obtain from a user values for parameters and is implemented by a natural language interface is defined. The conversation is associated with the automation process that is configured to utilize a user interface of a computer program to input data thereto or execute functionality thereof. The automation process is a parameterized automation process depending on parameters. The conversation is published to be made accessible to a user via the natural language interface.

Information processing system and device control method
09794252 · 2017-10-17 · ·

An information processing system includes a terminal device connected to a first network; and an information processing device connected to a second network that is different from the first network. The terminal device includes an information retrieval unit for retrieving, from an electronic device, identification information of the information processing device and first authentication information; an access data retrieval unit for retrieving access data from the information processing device; and a processing request unit for transmitting a request for processing to the electronic device. The information processing device includes an information providing unit for providing, to the electronic device, the identification information of the information processing device and the first authentication information; an access data providing unit for providing, to the terminal device, the access data; and a processing request transmission determining unit for transmitting the request for processing from the terminal device to the electronic device.

Ownership maintenance in a multi-tenant environment
11258784 · 2022-02-22 · ·

Approaches presented herein enable credentials to be revoked or otherwise modified while limiting the impact of inadvertent or unintended changes in access. In some embodiments, the revocation of a credential can occur over a period of time with the level of access being diminished over that period, in order to prevent an inadvertent denial of access while indicating to the requestor that there is an issue with the credential. When a new policy is created for a new credential, a prior policy can be retained for at least a period of time such that users with inadvertently revoked access can obtain a level of access per the previous policy. Various embodiments trace the calls for a credential throughout the system in order to determine which services, processes, or components might be affected by the revocation, such that an appropriate remedial action can be taken.

Managing system and managing method for managing authentication for cloud service system
11258793 · 2022-02-22 · ·

The invention discloses a managing system and managing method for managing authentication for a cloud service system. When a user operates a data processing apparatus to execute an unprotected start-up procedure to start up a browser application to access from an unprotected space of a data storage unit and transmits an authentication data including no characteristic data associated with a protected space of the data storage unit to the cloud service system through the browser application, the cloud service system redirects the authentication data to an authentication server. The authentication server judges if the authentication data has the characteristic data associated with the protected space, and if NO, the authentication server transmits an alert message representative of refusal of login to the cloud service system. The cloud service system redirects the alert message to the browser application.

AUTHENTICATION MANAGEMENT METHOD, INFORMATION PROCESSING APPARATUS, WEARABLE DEVICE, AND COMPUTER PROGRAM
20170295492 · 2017-10-12 ·

An authentication management method executed in a plurality of apparatuses cooperating each other communicably connecting, to allow reception of instruction by a user, a first information processing apparatus which performs authentication that the user is a predetermined person and a second information processing apparatus which is worn by the user, in a case where the user wearing the second information processing apparatus has been identified, by the second information processing apparatus, to be the predetermined person, identifying, by the second information processing apparatus, whether or not the first information processing apparatus and the second information processing apparatus are associated with each other as a plurality of apparatuses which perform cooperative processing.

IDENTITY VERIFICATION METHOD, TERMINAL, AND SERVER

An identity verification method performed at a terminal includes: displaying and/or playing in an audio form action guide information selected from a preset action guide information library, and collecting a corresponding set of action images within a preset time window; performing matching detection on the collected set of action images and the action guide information, to obtain a living body detection result indicating whether a living body exists in the collected set of action images; according to the living body detection result that indicates that a living body exists in the collected set of action images: collecting user identity information and performing verification according to the collected user identity information, to obtain a user identity information verification result; and determining the identity verification result according to the user identity information verification result.