H04L2463/082

Token based authentication

According to an example aspect of the present invention, there is provided an apparatus comprising a memory configured to store a first token and a second token, and at least one processing core configured to obtain a first value based at least in part on the first token and the second token, and to cause the apparatus to participate in a security procedure, based at least in part on the first hash, with a second apparatus.

Multifactor authentication from messaging systems

A user is assigned an initial risk score during a session with a messaging platform. During the session, the user attempts an operation with an external service. One or more additional authentication factors are requested from the user to dynamically lower the initial risk score. The lowered risk score is processed with the external service to perform the operation on behalf of the user during the session.

Asserting user, app, and device binding in an unmanaged mobile device

A request generated by an unmanaged app to access a resource is received from a mobile device. A notification is sent to the mobile device. A device level VPN connection to the mobile device is established. A unique identifier is associated with the device level VPN. App level traffic received via the device level VPN is tagged with the unique identifier. Access to the resource is allowed in response to the request based at least in part on a determination based on the tags that app level traffic from a trusted app and app level traffic from the unmanaged app are associated with the same mobile device.

Passthought for multifactor authentication in augmented reality

A system and method for multifactor authentication. The method includes receiving a passthought brainprint and a training 3D pattern. The method also includes calculating a variance between the training 3D pattern and a passthought 3D pattern, and generating an error tolerance for the passthought 3D pattern based on the calculated variance between the training 3D pattern and the passthought 3D pattern. Further, the method includes storing the passthought 3D pattern and the passthought brainprint in a neural profile as a passthought for a secure area.

Information processing apparatus, authentication method, and non-transitory recording medium storing instructions for performing an information processing method
11206255 · 2021-12-21 · ·

An improved information processing apparatus, an authentication method and non-transitory recording medium are provided. The information processing apparatus authenticates a user based on first authentication information input by a user to generate an authentication result based on the first authentication information, receives an authentication request generated by first application software, authenticates the first application software based on second authentication information to generate an authentication result based on the second authentication information when the authentication request includes the second authentication information, acquires the authentication result of the user based on the first authentication information when the authentication request does not include the second authentication information, and executes processing based on one of the authentication result based on the first authentication information and the authentication result based on the second authentication information.

Dynamic Risk Detection And Mitigation Of Compromised Customer Log-In Credentials
20210392130 · 2021-12-16 ·

This invention relates to a process for detecting and mitigating risk generated when a customer's log-in credentials are compromised. A significant majority of stolen credentials and customer's personally identifiable information data eventually make their way to the dark web. By dynamically monitoring the dark web and combining the analysis with related information about the user and their credentials on the deep web and the surface web, through a machine learning model, a service provider pre-emptively or otherwise can act to mitigate the risk arising from such compromise of said customer log-in credentials.

INTELLIGENT TRANSACTION PRE-AUTHORIZATION USING A BROWSER EXTENSION

A computer-implemented method may be used for intelligent transaction pre-authorization using a browser extension. The method may including detecting user navigation by a user of a vendor web page, the vendor web page being associated with a vendor and detecting at least one input field of the vendor web page. Additionally, the method may include determining based on the at least one input field of the vendor web page, that the user is attempting a transaction with the vendor and determining information regarding the vendor based on the vendor web page. Additionally, the method may include executing a program to display on the vendor web page a request for the user to pre-authorize the transaction prior to completing the transaction and receiving, by the one or more processors, an indication from the user to pre-authorize the transaction. Additionally, the method may include receiving payment information of the user and processing the transaction between the user and the vendor.

Dynamic Authentication Control System
20210392133 · 2021-12-16 ·

Systems for dynamically controlling authentication data are presented. In some examples, registration data may be received. The registration data may include user data, contact information, and authentication data which may include deoxyribonucleic acid (DNA) data of a user. In some arrangements, a request to process an event may be received. The request may include event details which may be used to determine or identify an authentication tier of the event. Based on the identified authentication tier, one or more authentication factors for request may be dynamically identified. The request for authentication factors may be transmitted to a user device and authentication response data may be received. The authentication response data may be compared to the authentication data received at registration (or otherwise pre-stored) to determine whether a match exists. If the data matches, the event may be authorized for processing. If not, the event process request may be denied.

Information processing system, information processing apparatus, and data output apparatus
11201860 · 2021-12-14 · ·

An information processing system includes a data output apparatus and an information processing apparatus. The data output apparatus includes processors and memories to store instructions which cause the processors to receive a first authentication information, request authentication based on the first authentication information, and transmit the first authentication information authenticated in response to the authentication request and a transmission request of information indicating storage locations to store data output from the data output apparatus. The information processing apparatus includes processors and memories to store instructions which cause the processors to receive a second authentication information, request authentication based on the second authentication information, determine whether the second authentication information authenticated in response to the authentication request and the first authentication information transmitted from the data output apparatus have a predetermined relationship, and transmit information indicating the storage locations when the first and the second authentication information have the predetermined relationship.

Public authentication systems and methods

Techniques provided herein relate to electronic authentication on public systems. A backend system receives at least one electronic data action request from a publicly available client system that is shared amongst a plurality of users. At least a portion of the primary authentication information is received from a secondary device separate from the publicly available client system. The electronic data action request is authenticated by determining if the primary authentication information matches expected primary authentication information that is expected to complete the electronic data action request. Performance of the electronic data action request is facilitated when the primary authentication information matches the expected primary authentication information.