H04L2463/082

Authentication based on a physical key

A device may obtain registration data associated with a registration of an individual. The registration data may include an image that depicts a physical key and a reference object. The device may process the image to identify a first feature of the physical key and a first measurement of the first feature based on the size of the reference object. The device may store first feature data based on the first feature and the first measurement. The device may obtain second feature data based on a second feature of the physical key and a second measurement of the second feature identified from an insertion of the physical key into a keyhole of an authentication mechanism. The device may determine whether the first feature data corresponds to the second feature data. The device may authenticate the individual based on determining that the first feature data corresponds to the second feature data.

Multi-factor authentication with geolocation and voice command
11201873 · 2021-12-14 · ·

A method of multi-factor authentication is performed by an access control device. In response to detecting a voice command, the access control device sends a query to a location server for a current location of a user equipment (UE) included in a list of trusted UEs. The access control device may then receive an indication of the current location from the location server and in response thereto, the access control device may determine whether the current location of the UE is within a threshold distance of the access control device. If so, the access control device may generate an access signal that indicates that a user associated with the UE is authorized to access a protected resource.

SYSTEM AND METHOD FOR SECOND FACTOR AUTHENTICATION TO PERFORM SERVICES

A system and method are disclosed that leverage multi-factor authentication features of a service provider and intelligent call routing to increase security and efficiency at a customer call center. Pre-authentication of customer support requests reduces the potential for misappropriation of sensitive customer data during call handling. A contactless card uniquely associated with a client may provide a second factor of authentication via a backchannel to reduce the potential for malicious third-party impersonation of the client prior to transfer of the call to the customer call center. Pre-authorized customer support calls may be intelligently and efficiently routed directly to call center agents, without incurring further delay. During call handling, call center agents may initiate further client authentication processes, including contactless card authentication requests, over one or more different communication channels for authorizing access to sensitive information or to allay suspicion.

SYSTEM AND METHOD FOR SECURE STORAGE OF DIGITAL CURRENCIES AND MAKING TRANSACTIONS IN A BLOCKCHAIN NETWORK

The claimed solution relates to a method of making transactions in the blockchain framework using a protected hardware and software complex to ensure secure storage of digital currencies (cryptocurrencies) and control the entire lifecycle of multiple wallets simultaneously to make transactions in the blockchain network. Basic features of the hardware and software complex include the effective control over the entire life cycle of cold wallets, generation of digital wallets and secure storage of their private keys in an isolated environment using the hardware security modules (HSM), as well as maintaining the multiple level authentication of blockchain transactions. It is possible to use all the features of the complex due to compatibility with the application programming interface (API), which enables to integrate the complex into the existing software solutions, for example, banking systems.

METHOD AND SYSTEM FOR CONTEXT AWARE FRICTIONLESS AUTHENTICATION BASED ON AUTHENTICATION SCORES

Described embodiments provide systems and methods for context aware frictionless authentication. A server may determine authentication method information, contextual scores and contextual weights of a device, in connection with a user request to access a resource via the device. The authentication method information may include a weight and a completion duration for each of a plurality of authentication methods available via the device. The server may determine an authentication score for each of the plurality of authentication methods using the authentication method information, the contextual scores and the contextual weights of the device. The server may identify a first authentication method from the plurality of authentication methods, according to the determined authentication score. The server may authenticate the user request via the first authentication method using a first device that supports the first authentication method.

SYSTEMS AND METHODS FOR EXECUTING ECOMMERCE EXPRESS CHECKOUT TRANSACTIONS

Systems and methods are disclosed for executing an electronic transaction using a digital wallet. One method includes receiving an express checkout request and electronic transaction data from an electronic transaction browser. The digital wallet system may determine whether a user is enrolled in the digital wallet system. The digital wallet system may transmit a verification request to the electronic transaction browser upon determining the user is enrolled in the digital wallet system. The digital wallet system may receive a verification response from the electronic transaction browser. The digital wallet system may generate a graphical interface including predetermined user data. The digital wallet system may complete an electronic transaction based on the user response.

SYSTEMS AND METHODS FOR MULTIVARIATE ARTIFICIAL INTELLIGENCE (AI) SMART CARDS

Systems and methods for multivariate Artificial Intelligence (AI) smart cards are provided. An AI smart card may include, for example, pre-stored policy data that may be utilized as a portion of multivariate input by a suite of AI modules to formulate and analyze a claim of loss.

MULTI-FACTOR AUTHENTICATION FOR ACCESSING AN ELECTRONIC MAIL
20210385183 · 2021-12-09 · ·

Systems and methods for facilitating secure access to email messages based on multi-factor authentication are provided. According to one embodiment, an electronic mail (email) addressed to an email recipient is received by a mail transfer agent (MTA) associated with a mail server. A security policy is assigned to the email by the MTA based on one or both of metadata associated with the email and content of the email. When the security policy calls for multi-factor authentication of the email recipient, the email recipient is caused to be notified regarding existence of the email by the MTA and instructed to complete a multi-factor authentication process in order to access the email. Responsive to successful completion of the multi-factor authentication process, the email is permitted by the MTA to be accessed by the email recipient.

METHOD AND APPARATUS FOR PROTECTED AUTHENTICATED EMERGENCY SYSTEM HALT MECHANISM FOR DISASTER AND CYBER SCENARIOS
20210385640 · 2021-12-09 · ·

Various methods, apparatuses/systems, and media for implementing an emergency system halt mechanism are disclosed. A processor establishes a communication link with a plurality of data sources and a receiver. The receiver receives data related to disaster and/or cyber scenarios from the plurality of data sources. The processor automatically determines, by utilizing an intelligent activation system (IAS), whether to activate an emergency system halt mechanism (ESHM) upon detection of a disaster and/or a cyber scenario based on analyzing the received data and using pre-determined rules and artificial intelligence (AI)/machine learning (ML) models. The processor also automatically determines whether to activate or deactivate the ESHM based on a result of determination of the IAS. Once activated, a secure voice-based authentication processes designed to work in the limitations of cyber and disaster scenarios allow registered users to take actions such as halt or resume systems.

SYSTEM FOR DYNAMIC NETWORK AUTHENTICATION PROTOCOLS

A system for implementing and managing network-based, variable authentication protocols receives information relating to a digital monetary transaction. Additionally, the system accesses an initial authentication protocol dataset. The system also generates a variable authentication protocol dataset. The system then communicates the variable authentication protocol dataset to the point-of-sale computer system. The system also receives, from the point-of-sale computer system, authentication tokens. Further, the system validates the authentication tokens in view of the variable authentication protocol dataset. Further still, in response to the validation of the authentication tokens, the system processes the digital monetary transaction.