Patent classifications
H04L2463/082
APPLICATION INTEGRATION USING MULTIPLE USER IDENTITIES
A method of providing access to digital resources using multiple user identities comprises receiving, from a client application, a first set of authentication tokens that authorize a user to acquire target data provided by a server application. The method further comprises receiving, from the client application, a second set of authentication tokens that authorize the same user to access a connected application. The method further comprises sending, to the server application, a first request to acquire the target data provided by the server application, the first request including the first set of authentication tokens and an identifier of the target data. The method further comprises receiving, from the server application, the target data. The method further comprises sending the target data from the application connector to the connected application in a second request that also includes the second set of authentication tokens.
MULTI-FACTOR AUTHENTICATION USING CUSTOMIZABLE PHYSICAL SECURITY TOKEN
In some implementations, an authentication system may receive, from a client device, a credential associated with a user account and a request to access a resource. The authentication system may transmit, to the client device, a request for an image of a customized physical security token associated with the user account. The authentication system may receive, from the client device, a first image. The authentication system may compare the first image with a representation of a second image of the customized physical security token associated with the user account. The authentication system may grant or denying access to the resource based on comparing the first image with the representation of the second image.
DYNAMIC ACCESS CONTROL AUTHENTICATION CONFIDENCE VALUES BASED ON MULTIAUTHENTICATION MODES
A computer readable medium having executable code that causes one or more processors to: receive at least one of a first image of the user or a first representation of a face of the user; if a first image of the user was received, then generate a generated representation of the face of the user using the first image; capture a second image of the user and generate a second representation of the face of the user using the second image; receive an authentication factor; determine validity of the authentication factor; reduce a confidence threshold based on the authentication factor; determine a likelihood of a match between the second representation and at least one of the first representation and the generated representation; and permit access by the user to a secure asset in instances where the likelihood of a match meets the confidence threshold.
SYSTEMS AND METHODS FOR PASSIVE MULTI-FACTOR AUTHENTICATION OF DEVICE USERS
A passive Multi-Factor Authentication (MFA) system includes a passive MFA server that receives, from a user computing device, passive biometrics data and device data collected during a current session on a remote site; submits the passive biometrics data to a user profile model, and in response receives a user authentication confidence score; and submits the device data to a device profile model, and in response receives a device authentication confidence score. The passive MFA server is also configured to receive a user authentication request for a current payment transaction associated with the current session on the remote site, and transmit the user authentication confidence score and the device authentication confidence score to an Access Control Server (ACS) configured to determine that the scores satisfy a predefined threshold for passively authenticating a user of the user computing device during the current session, without conducting an active authentication process with the user.
SECURE STORAGE PASS-THROUGH DEVICE
Techniques for securing data are disclosed. A security device includes: one or more processors; one or more authentication components including one or more of a biometric reader, a positioning system, and a wireless receiver; and one or more non-transitory computer-readable media storing instructions that, when executed by the one or more processors, cause the one or more processors to perform operations including securing data on a storage device that is external to the security device, using multiple authentication factors obtained using the one or more authentication components.
Wearable HCI Device
An audio generation device includes a housing adapted to be worn by a user, memory, and a processor configured to execute computer-executable instructions. The device includes at least two of the following: an adhesive located on an outer surface of the housing to removably couple the housing to the body of the user, a transducer coupled to receive an electrical signal from the processor, convert the electrical signal to an audio signal, and supply the audio signal to the body of the user, a six degrees of freedom (6DOF) sensor coupled to detect translation of the housing along three perpendicular axes, and rotation of the housing about the three perpendicular axes, a biometric sensor coupled to detect at least one biometric parameter of the body of the user, a rechargeable battery removably coupled with the housing, and a wireless interface to transmit data via a wireless network.
Systems and methods for tiered authentication including position-based credentials
The present disclosure relates to systems and methods for implementing tiered authentication using position-based credentials. A system for authenticating a user with position-based credentials may include one or more memories storing instructions and one or more processors configured to execute the instructions to perform operations. The operations may include receiving a login request associated with the user from a first user interface device; receiving a first location associated with the first user interface device; receiving a second location associated with a second user interface device; when a Lebesgue distance between the first location and the second location is below a first threshold, authenticating the user; when the Lebesgue distance is above the first threshold and below a second, larger threshold, prompting the first interface device for a first credential; and when the Lebesgue distance is above the second threshold, prompting the first interface device for a second credential.
System for authentication of resource actions based on multi-channel input
Embodiments of the present invention provide systems and methods for authentication of users and authorization of user actions, and distribution or transfer of resources based on multi-channel input via a user device or one or more auxiliary user devices, such as smart home devices. The system is further configured to perform one or more user activities, in an integrated manner, within a single interface of the user device, without requiring the user to operate disparate applications. Furthermore, the system is configured to receive user input through multiple communication channels such as a textual communication channel and an audio communication channel and store unique user patterns to form an authentication baseline for subsequent user communications.
METHOD FOR EDGE COMPUTING SERVICE AND ELECTRONIC DEVICE THEREFOR
The present disclosure relates to a 5G or pre-5G communication system to be provided for supporting a data transmission rate higher than that of a 4G communication system such as LTE. A method, according to one embodiment of the present invention, is a method for authenticating an electronic device which receives an edge computing service from an authentication server of a mobile communication system, wherein the method may comprise the steps of: performing first authentication (403) of the electronic device by means of authentication and key agreement (AKA) with the electronic device, and, when the first authentication is successful, providing first authentication information to the electronic device; and performing second authentication (411) for the edge computing service of the electronic device, and, when the second authentication is successful, providing the electronic device with second authentication information which includes an access token for authentication of the edge computing service.
COMPUTER TRANSACTION SECURITY WITH DELEGATED DECISIONS
A method for authenticating e-commerce transactions involves receiving, from a payment network computer, a first authentication request message to authenticate a transaction associated with a payment account, the first authentication request message being initiated by an issuer domain computer not implementing a 3-D Secure authorization protocol, determining that the issuer domain computer has configured, at the access control server computer, a decision function of a second portion of the 3-D Secure authorization protocol and in response thereto, transmitting, to the issuer domain computer, a decision request message and information associated with the transaction, the decision request message requesting the issuer domain computer to determine an action for authenticating the transaction based on the information associated with the transaction and one or more programmatic rules of the issuer domain computer, the transmitting occurring in lieu of the access control server computer executing the decision function at the access control server computer.