H04L2463/082

SECURE LOGIN WITH AUTHENTICATION BASED ON A VISUAL REPRESENTATION OF DATA

Techniques for managing secure login with authentication while viewing a unique code are described. In some examples, a requesting device displays a visual representation of data. An authenticating device detects the presence of the visual representation of data. The authenticating device prompts a user to provide authorization information at the authenticating device. The authenticating device receives a set of one or more inputs. The authenticating device transmits information authorizing access to content on the requesting device.

Method and system for transaction authorization based on a parallel autonomous channel multi-user and multi-factor authentication
11328299 · 2022-05-10 · ·

A system for authorizing electronic transactions using a form of a token possessing credentials of an account holder, wherein the system transmits a verification message to a terminal where this terminal is different from the one the electronic transaction is conducted on, and through this combination the system shall verify that the transaction is being conducted by the authorized owner of the token used.

Issuing, storing and verifying a rich credential

A method and system are provided for multifactor identification of a subject over a network using a rich credential, with selective disclosure of attributes and selective presentation of verification factors. A credential presentation application negotiates with a verifying server to agree on attributes to be disclosed and verification factors to be presented, and removes unneeded attributes and verification data from the rich credential by pruning subtrees from a typed hash tree without invalidating a signature that covers the root label of the tree. The credential presentation application proves knowledge of a private key, and as agreed upon may prove knowledge of a password and may arrange for biometric presentation applications to present one or more biometric samples to the verifier, which performs presentation attack detection and verifies the samples against verification data in the rich credential.

SECURE RESOURCE ACCESS BY AMALGAMATED IDENTITIES AND DISTRIBUTED LEDGER

A server receives encrypted data from a protected-resource-requesting device that includes an encrypted combination of the device and user identification. The first server requests a most recent copy of data of a distributed ledger from a randomly selected logged-in workstation. The first server searches for a match of the encrypted data from the first device in the distributed ledger data received from the randomly selected workstation. In response to determining a match, the first server updates a table of a second server with a one-time-password (OTP) and a copy of the encrypted data received from the device. The first server sends the OTP and an instruction to the device to send the OTP and the encrypted data to the second server, which determines whether a match exists. In response to a confirmed match, the first server grants access to the device.

Mutli-factor authentication systems and methods

Systems and methods are provided for secure access to data actions. In one embodiment, secondary device data is associated with a user profile, such that the secondary device data may be subsequently used to authenticate a user associated with the user profile.

CONTROL SYSTEMS AND TECHNIQUES FOR SECURE OBJECT AUTHENTICATION

Disclosed are systems, apparatuses, processes, and computer-readable media to implement a heterogenous biometric authentication process in a control system. For example, a method may include detecting the presence of a first person at a first time period and in an area associated with a function controlled by a control system. The method may include transmitting an authentication request to a first device detected by the control system, and receiving an authentication response from the first device. The authentication response includes information related to a biometric authentication performed at the first device. The method may further include authenticating the first person in the control system based on the information related to the biometric authentication. The method may then perform the function based on the authentication.

Automated transparent login without saved credentials or passwords
11328042 · 2022-05-10 · ·

A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.

TECHNIQUES FOR AUTHENTICATING USING UNIQUELY ASSIGNED WEBPAGES
20230262037 · 2023-08-17 · ·

Techniques for authenticating via uniquely assigned webpages. A method includes encoding an authentication webpage into code including a security token that is uniquely assigned to a user. The code of the authentication webpage configures a system to display the authentication webpage and to provide the security token to a service requiring authentication by the user when the code is executed by the system. A database including the code of the authentication webpage is created. The code of the authentication webpage is provided from the database to a device when the device navigates to a web address of the authentication webpage.

METHOD AND SYSTEM FOR USER AUTHENTICATION VIA AN AUTHENTICATION FACTOR INTEGRATING FINGERPRINTS AND PERSONAL IDENTIFICATION NUMBERS

A method of authenticating a user that includes initializing the multi-factor authentication system based on an input; presenting a challenge requesting the user to enter a specific authenticator of a sequence of authenticators stored in the multi-factor authentication system, where the stored sequence of authenticators represents a combination of a plurality of authentication factors; receiving an authenticator from the user in response to the challenge; verifying identity of the user by determining whether the received authenticator matches the specific authenticator requested by the challenge; and granting the access based on a determination that the received authenticator matches the specific authenticator requested, or denying the access based on a determination that the received authenticator does not match the specific authenticator requested.

Biometric authentication system

The disclosure describes a biometric authentication system that can authorize a transaction at a retail store using a person's biometric data and password. The biometric authentication system may include a point-of-sale device that can receive a biometric data (e.g., voice data, fingerprint data, or facial data) of a person that initiates a transaction. The biometric authentication system may also include one or more authentication systems that analyzes the received biometric data, and an authorization system that compares data obtained from the one or more authentication systems and the POS device to determine whether the information obtained from the person is related to that person's biometric and password information previously stored by the authorization system.