Patent classifications
H04L2463/082
Multifactor Authentication for Internet-of-Things Devices
Concepts and technologies are disclosed herein for multifactor authentication for Internet-of-things devices. An access request can be received from an Internet-of-things device. The access request can include identifying information associated with the Internet-of-things device and a certificate. The certificate can be validated and a stored version of the identifying information can be obtained. If the stored version of the identifying information is determined to match the identifying information included with the access request, access to a resource can be allowed.
Method and apparatus for identity authentication, server and computer readable medium
The embodiments of the present disclosure relate to information processing technology and provide a method for identity authentication, capable of effectively improving security and accuracy in identity authentication. The method includes: receiving an authentication request transmitted from a client, the authentication request carrying identity authentication information of a user; authenticating the identity authentication information; collecting behavior characteristic information related to the user in a number of dimensions when the identity authentication information is determined to be valid; matching and recognizing an identity of the user by comparing the collected behavior characteristic information with original characteristic information in the respective dimensions. The embodiments of the present disclosure can be applied in a process for user identity authentication.
METHOD AND SYSTEM OF MULTI-CHANNEL USER AUTHORIZATION
The present disclosure relates to a system and methods for providing user authorization via a computer network, particularly, by using mobile authorization, wherein a user can be granted access in a variety of mobile channels. The preferred embodiment of the claimed disclosure presents a user authorization system comprising a user device associated with a data source via a data channel, while the data source is associated with an authentication system, in which there are: the user device configured to form an authorization request to the data source via at least one mobile channel associated with said device; the data source configured to receive the user authorization request and transmit the corresponding request to the authentication system; and the authentication system providing user authorization on said resource via at least one mobile channel associated with the user device.
Authenticating to secured resource via coupled devices
A technique for performing authentication includes a first device receiving security data from a second device that shares its network connection with the first device. The first device applies the security data received from the second device when requesting authentication to a secured resource on the network. For example, the security data may include a token code or other data that may be used as a token, such as identification information about the second device.
Partner integration network
Systems and methods are provided for a media provider to allow a user to access media objects with a third-party partner that authenticates the user and authorizes the user to access certain media objects. The media provider offers access to media objects, such as video content or audio content. The partner, through a relationship with the media provider, similarly offers access to the media provider's media objects, for example, as a service or benefit to the partner's customers or users. In particular, a partner integration server mediates user authentication and authorization by the partner. The partner integration server also allows the media provider to easily and flexibly to add and integrate additional partners.
Computer system, login screen display method, and storage medium for displaying an appropriate login screen
A computer system includes an information processing system configured to authenticate a user using one of multiple login methods and a terminal configured to request the information processing system to authenticate the user. The terminal includes a processor programmed to determine a login method based on a previously-used login method and display a login screen corresponding to the determined login method.
Edge-node touchless authentication architecture
This disclosure describes an edge-node computing system that provides streamlined access to secured products/services based on data captured by one or more sensors. The captured data may include unsolicited authenticators. Edge-nodes may process the captured data and perform a plurality of pre-authentication routines. A consensus protocol executed by the edge-nodes may establish a threshold pre-authentication of a customer based on the plurality of pre-authentication routines. Edge-nodes may configure an automated teller machine (“ATM”) to provide the customer access to the ATM based on the threshold pre-authentication. The edge-nodes may configure the ATM to allow the customer to use a contactless authentication method to access the ATM.
Artificial intelligence encryption model (AIEM) with device authorization and attack detection (DAAAD)
A user of a client device establishes a secure connection to a server (or other) device without using public keys or third-party certification by entering only a subset of characters in a username associated with the user and a one-time-use password at the client device; an application on the client device collects information regarding the hardware, software, or network information related to the client device or biometric information related to the user. Data sent between the client and server is encrypted (and thereafter transmitted) using the subset of characters, one-time-use password, and collected information. Communications between the client and server may be monitored to detect a man-in-the-middle attacker, and a security strength may be varied accordingly.
Method and apparatus for multifactor authentication and authorization
Methods and systems for multifactor authentication and authorization are described. A method includes receiving captured image data of a person with a badge needing access to a secure area, detecting at least two faces from the captured image data, identifying a first name based on matching a face associated with a live human face with a control face in a database, identifying a second name based on matching on another face associated with the badge with a control face in a database, performing character recognition on text associated with the another face, comparing the second name with the character recognized text, comparing the second name with the first name when the second name matches the character recognized text, checking access rights, checking for at least another person in a proximity of the secure area, and granting access when the person is sole person accessing the secure area.
Identity Authentication Method and Apparatus, and User Equipment
An identity authentication method includes detecting a scenario in which the user equipment is located, determining, from at least two different authentication levels of the user equipment, an authentication level corresponding to the scenario in which the user equipment is located, acquiring current biometric feature data entered by a user, and determining, according to the current biometric feature data, preconfigured biometric feature data, and the authentication level, whether identity authentication succeeds.