Patent classifications
H04L2463/082
Public authentication systems and methods
Techniques provided herein relate to electronic data access requests. An access system receives at least one electronic data action request from a client. At least a portion of the data access authentication information is sourced from a secondary device connected to an intermediary device. The electronic data action request is authenticated based upon the data access authentication information.
Wireless multi-factor authentication based on proximity of a registered mobile device to a protected computing device at issue
Systems and methods for a passive wireless multi-factor authentication approach are provided. According to one embodiment, a user authentication request is received by a first computing device connected to a private network. The user authentication request is sent by an endpoint protection suite running on the first computing device to an authentication device associated with the private network. A proximity of a second computing device, which was previously registered with the authentication device to be used as a factor of a multi-factor authentication process involving the first computing device, is determined by the authentication device in relation to one or more wireless access points of a wireless network of the private network. The user authentication request is then processed by the authentication device based on the proximity.
IDENTITY ACCESS MANAGEMENT USING ACCESS ATTEMPTS AND PROFILE UPDATES
Systems and methods for managing a reputation score of a user based on successful and failed logins, successful and failed multifactor authentications, and profile changes is described. The method includes receiving, by a server, status information of a user event from one or more computing devices. The status information includes one or more of an indicator of a successful login, an indicator of a failed login, an indicator of a successful multifactor authentication, an indicator of a failed multifactor authentication, an indicator of a profile update, and metadata associated with the user event from the one or more computing devices. The server updates events based on a type of the status information received and storing the events in a data store and determines whether a problematic situation has occurred. A reputation score of the user is updated when the problematic situation is determined.
SYSTEMS AND METHODS FOR IDENTITY VERIFICATION REUSE
A method and apparatus for providing secure and efficient identity verification reuse to a user of a commerce platform are described. The method may include receiving a first set of user data associated with the user from a merchant system for identity verification of the user, and a second set of user data associated with the user, the second set of user data to verify a purported identity of the user. The method may also include verifying the purported identity of the user as a true identity of the user based on the first set of user data and the second set of user data. Furthermore, the method can include in response to a positive verification of the identity of the user, generating a cookie having an identifier and collecting a second authentication factor generated by a user device of the user, wherein the identifier of the cookie is associated with the second authentication factor by the commerce platform for identity verification reuse.
Extending management control to IoT devices
A technique uses a managed computing device to extend management control by an organization to IoT (Internet of Things) devices in a local environment of the computing device. The computing device discovers any local IoT devices and participates in a communication with a server to bring one or more of the IoT devices under management control. In some examples, extending management control involves enrolling selected IoT devices into a management framework of the organization and directing communications between the server and the respective IoT devices through the managed device, which provides a point-of-presence for administering management of the selected IoT devices in the local environment.
MULTI-FACTOR AUTHENTICATION
Systems and methods for multi-factor authentication are based on validation of an inherence factor and a possession factor obtained in a “frictionless” or almost frictionless manner. A method conducted at a software application executing on a user device associated with a user and connected to a server computer, includes obtaining signing or encryption of a set of data elements using a cryptographic key securely stored for exclusive use by the software application and transmitting the signed or encrypted data elements to the server computer. The method includes transmitting, to the server computer, a payload including contextual data which includes behavioural data collected via one or more contextual data sources. The signed data elements represent a possession factor and the payload including contextual data represents an inherence factor for validation and multi-factor authentication by the server computer.
Embedding content in audio content through a voice assistant
Disclosed are various approaches for authenticating a user through a voice assistant device and creating an association between the device and a user account. The request is associated with a network or federated service. The user can use a client device, such as a smartphone, to initiate an authentication flow. A passphrase is provided to the client device can captured by the client device and a voice assistant device. Audio captured by the client device and voice assistant device can be sent to an assistant connection service. The passphrase and an audio signature calculated from the audio can be validated. An association between the user account and the voice assistant device can then be created.
Early data breach detection
Apparatuses, methods, systems, and program products are disclosed for early data breach detection. An apparatus includes a data module configured to receive user data from a darknet. User data may include user credential information that has been misappropriated. An apparatus includes a match module configured to determine whether user credential information matches a user's credentials for a user's one or more online accounts. An apparatus includes an action module configured to trigger a security action related to a user's one or more online accounts to make the user's one or more online accounts more secure in response to determining that user credential data matches the user's credentials at the user's one or more online accounts.
TRAIN ANY BUDDY REAL-TIME ONLINE MATCHING SERVICE
A system and method for providing an online, real-time exercise buddy and trainer matching service is disclosed. The system includes a trainer mobile device, an exercise buddy a trainer's current location data to the web server, a trainer query processor for responding to an exercise buddy query for available trainers, and a trainer messenger for communicating with the exercise buddy mobile devices. The exercise buddy mobile device has an exercise buddy trainer locator for obtaining identities and locations of one or more trainers currently available, an exercise buddy query generator for generating a trainer profile query to one of the currently available trainers, and an exercise buddy messenger for communicating with one or more of the trainer messengers. The web server has a trainer tracker for communicating with one or more of the trainer locators to maintain a set of currently available trainers and their respective current locations, a query manager for receiving and processing requests from one or more exercise buddy trainer locators, and a notification manager for providing all system notifications to the exercise buddy mobile device and trainer mobile device regarding appointments and messages.
MULTI-FACTOR AUTHENTICATION OF INTERNET OF THINGS DEVICES
A computer-implemented method, system and computer program product for utilizing multi-factor authentication to authenticate an Internet of Things (IoT) device. The identity credentials of neighboring IoT device(s) are obtained by the IoT device to be authenticated. Upon providing a request to the authentication system to prove its identity, the IoT device provides the authentication system a first factor credential, such as a username and password. The authentication system, upon confirming the accuracy of the first factor credential, challenges the IoT device to provide the second factor credential. After receiving the challenge from the authentication system to provide the second factor credential, the IoT device returns the second factor credential that was generated based on the obtained identity credentials from the neighboring IoT device(s). Upon determining that the received second factor credential includes the identity credentials from the minimum number of required neighboring IoT devices, the authentication system approves authentication.