H04L2463/082

System and method for detecting unauthorized device access by comparing multiple independent spatial-time data sets from other devices

An authentication procedure utilizes multiple independent sources of data to determine whether usage of a device, such as a desktop computer, is authorized. When a comparison indicates an anomaly from the base-line usage data, the system, provides a notice that access of the first device is not authorized.

Methods and systems for multiple channel authentication

Methods and systems for multiple channel authentication are described. In one embodiment, a request for a combined voice and data call is initiated from within a mobile application. The request may include authentication information and contextual information relating to a current exchange between the mobile application and an organization. The user may be authenticated with the authentication information and the combined voice and data call may be routed to a representative based on the contextual information to continue the exchange.

Automatic link based message verification
11243822 · 2022-02-08 · ·

A method for automatically verifying a message using a remote system includes receiving, at a remote system, a request to launch an application from a current user to communicate where the request includes a unique feature associated with a potential user's device that is required for registration. The method includes generating a selectable-link, and transmitting a first message that includes the selectable-link to the potential user's device. The first message is configured to cause the potential user's device to display the link, launch the application in response to receiving selection indication of the selectable-link, and transmit a verification code to the remote system. The method further includes registering the potential user's device in response to receiving the verification code.

System and method for managing electronic locks

An access management system and a method for managing electronic locks are disclosed. The system comprises a user management module configured to provision access rights to an authorized user associated with the electronic lock, wherein a first factor authentication data is configured to be associated with the authorized user. The system comprises a server arranged in wireless communication with the access management system and each electronic lock associated with each of the plurality of entry points. The server is configured to perform a first factor authentication and a second factor authentication of the user for releasing the electronic lock for entry to the authorized user of the entry point.

METHOD AND APPARATUS FOR CONNECTING BETWEEN ELECTRONIC DEVICES USING AUTHENTICATION BASED ON BIOMETRIC INFORMATION

A method and an apparatus for providing a connection between electronic devices using authentication based on biometric information are provided. The electronic device includes: a first communication circuit to support NFC; a second communication circuit to support non-NFC; a biometric sensor; a memory to store first authentication information corresponding to an external device; and a processor. The processor is configured to: acquire connection information related to a connection with the external device from the external device using the first communication circuit in response to NFC tagging between the electronic device and the external device; establish a communication connection with the external device using the second communication circuit based on at least the connection information; receive a request for authentication information from the external device in response to the communication connection being established; acquire biometric information corresponding to a user of the electronic device using the biometric sensor in response to the request; authenticate the user based on at least the biometric information; when the authenticating succeeds, generate second authentication information based on at least the first authentication information; and transmit the second authentication information to the external device.

SYSTEM AND METHOD FOR PROVIDING AN IN-LINE SNIFFER MODE NETWORK BASED IDENTITY CENTRIC FIREWALL
20170244730 · 2017-08-24 ·

The instant disclosure is directed to an attack/unwanted activity detecting firewall for use in protecting authentication-based network resources. The instant system is adapted for installation inline or in sniffer mode. In various embodiments, defined rules are applied to network traffic to determine whether certain types of attacks are occurring on the network resources. If one such attack is detected, the system provides for several potential responses, including for example disconnecting the attacking remote machine, requiring the user at that machine to re-authenticate, and/or requiring a second factor of authentication from the user at that machine. In some example embodiments, regardless of any activity required of a user at the remote machine suspected of malicious behavior, the disclosed system generates an alarm or other alert for presentation as appropriate, such as via a graphical user interface or a third-party system using an API.

Systems and methods for communications channel authentication

A user may access an Institution system via more than one communications channel, either by the same device (e.g., a mobile device accessing the Institution system via a voice channel and a data channel) or by different devices (e.g., a personal computer via a web channel and a phone via a voice channel). If a user is not currently authenticated to a communications channel and attempts to access the Institution system via a communications channel, the user may be authenticated using strong authentication. If the user is currently authenticated to the Institution system via a communications channel and would like to engage a second communications channel to access the Institution system, the user may authenticate to the second communications channel using both communications channels and weak authentication, such as single factor authentication or a challenge question.

Using biometric user-specific attributes

Techniques are provided for determining two or more user-specific parameters that can be measured or obtained using various methods, and using values of the two or more user-specific parameters to uniquely identify or authenticate an individual. Examples of the user-specific parameters may include biometric parameters, textual-based parameters, a combination of biometric parameters and textual-based parameters, and the like.

Systems and methods for device based authentication

In some embodiments, computer implemented methods, systems, and non-transitory computer readable media determine a first comparison value based on a first comparison between a first sensor signature associated with first set of sensor data of a first device in a first context and a second sensor signature associated with second set of sensor data of a second device. The first comparison is associated with a first authentication type. It is determined whether the first comparison value satisfies a first threshold. It is determined that a user should be authenticated on the second device based on satisfaction of the first threshold.

Multi-Factor Authentication Using Positioning Data

Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity. For example, when a user wishes to change a password or access a secured account, the system can authenticate a user if a device associated with the user is located in the secure area. The system can authenticate a user if a requested operation and/or a predetermined pattern of movement associated with the user is detected. For instance, the system allows the user to change the password when the user's computer has followed a predetermined pattern of movement, and when one or more verification procedures meets one or more criteria while the location of the computing device is within the predetermined area.