H04L2463/082

MUTUAL MULTI-FACTOR AUTHENTICATION TECHNOLOGY

Computer software that stores information relating to a planned in-person meeting between a first user and a second user. The information includes a meeting time, a meeting location, and, for each of the first user and the second user: (i) a communications identifier associated with a device of the respective user, and (ii) a token identified by the respective user for the meeting. The computer software, in response to receiving an indication that the device of the first user is located at the meeting location at the meeting time, sends, to the device of the first user: (i) the communications identifier associated with the device of the second user, and (ii) the token identified by the second user for the meeting.

SECOND FACTOR BASED REALM SELECTION FOR FEDERATED AUTHENTICATIONS

In an approach for authentication of a username, a processor maintains a mapping of usernames and realms. A processor receives a username and a time-based one-time password code (TOTP code) for the username based on an authentication application. A processor, upon receiving the TOTP code: determines a realm from the mapping based on the received username and the received TOTP; and requests an entry of a credential relating to the username in the realm. A processor, upon receiving of the requested credential, authenticates the username by determining that the received credential matches an expected credential for the realm.

ENHANCED ACCESS CONTROL

A method for enhanced access control is provided that includes the steps of displaying buttons, by an electronic device, where each button corresponds to a different service. Moreover, the method includes receiving, by the electronic device, input regarding a selected service, transmitting at least one credential for the selected service to a computer, and capturing, by a camera in communication with the computer, facial image data of a user. The method also includes determining whether the facial image data was taken of a live person. In response to determining the facial image data was taken of a live person, a verification transaction is conducted based on the at least one credential and facial image data. In response to verifying the identity of the user as true, the user is granted access to the selected service.

USER CONFIGURED ONE-TIME PASSWORD

A tool for providing a user configured one-time password. Responsive to receiving a request for a one-time password, the tool sends the one-time password, based at least in part, on a user configured one time password rule. The tool receives a user configured one-time password return value for the one time password. The tool determines whether the user configured one-time password return value satisfies the user configured one-time password rule when applied to the one-time password. Responsive to a determination that the user configured one-time password return value satisfies the user configured one time password rule, the tool accepts the user configured one-time password return value and granting access to the application.

Systems and methods for touch screen interface interaction using a card overlay
11361302 · 2022-06-14 · ·

Example embodiments of systems and methods for touch screen interface interaction using a card overlay are provided. In an embodiment, a body may include a first main side and a second main side opposite the first main side, wherein the body is positionable with respect to a touch screen interface. The transaction card may further include indicia on the body, the indicia identifying a plurality of apertures through the body, wherein a user input provided through the plurality of apertures actuates corresponding touch locations on the touch screen interface to authenticate a transaction.

Home automation system supporting dual-authentication

Techniques are described for a security and automation system. One method includes detecting a presence of a person proximate a residence, receiving a first authentication factor from a device associated with the person, receiving a second authentication factor associated with the person, and initiating a change of state of a locking mechanism associated with a barrier of the residence based on the first authentication factor and the second authentication factor.

Proxy service for two-factor authentication
11363021 · 2022-06-14 · ·

The present disclosure relates to two-factor authentication with a Hardware Security Module (HSM). In response to a login attempt, the HSM indicates that two-factor authentication is required. To generate the second authentication factor, a management console is accessed using credentials. The management console generates the second authentication factor and provides the second authentication factor to the client. The client then provides the second authentication factor to the HSM to complete the two-factor authentication operations.

SYSTEMS AND METHODS FOR AUTOMATICALLY PERFORMING SECONDARY AUTHENTICATION OF PRIMARY AUTHENTICATION CREDENTIALS

The disclosed technology includes systems and methods for determining secondary authentication of a user's log-in attempts by comparing received behavioral biometric data and/or received scenario-specific data to saved behavioral biometric data and/or saved scenario-specific data, respectively. Responsive to determining that the received behavioral biometric data and/or received scenario-specific data is above a predetermined threshold of similarity with respect to the saved behavioral biometric data and/or saved scenario-specific data, respectively, the systems and methods can determine that the corresponding log-in attempt is secondarily authenticated. of a user device via behavioral biometric data. Responsive to determining that the level of similarity is not above the predetermined threshold, the systems and methods can initiate a secondary authentication method and can associate the received behavioral biometric data with a second user model.

CALL ORIGINATION VALIDATION FOR INCOMING CALLS WITHIN A WIRELESS COMMUNICATION NETWORK
20220182488 · 2022-06-09 ·

A computer-implemented method for validating the origination of an incoming customer call on a wireless communication network may include receiving a SIP invite message at the wireless communication network when the call is initiated, determining whether the SIP invite message includes one or more indicators indicating that the call originated within the wireless communication network from a device with a SIM registered in the wireless communication network, and writing a classification code to a database indicating that the call is validated if the SIP invite message includes the one or more indicators. The method may further include receiving the call at an agent computer device with caller identification information, querying the database via the agent computer device according to the caller identification information to obtain the classification code of the customer call, and suppressing a step used for call authentication if the classification code indicates that the call is validated.

CROSS-ENDPOINT ENTERPRISE APPLICATION AUTHORIZATION AND MANAGEMENT

A computer system to authorize a first endpoint to access enterprise digital resources is provided. The computer system includes the first endpoint, a second endpoint, and an endpoint management service being executed in a server. The endpoint management service communicates with the first endpoint via the second endpoint. For example, the endpoint management service receives authentication credentials from the first endpoint via the second endpoint. Similarly, the endpoint management service, upon verification of the authentication credentials, transmits an authorization token to the first endpoint via the second endpoint. The first endpoint, upon receiving and deploying the authorization token, can execute enterprise managed application programs and can access enterprise digital resources. In some examples, both the first and second endpoints are owned and/or used by a same user.