H04L2463/082

AUTHENTICATION OF USER ACTIVITIES BASED ON ESTABLISHING COMMUNICATION LINKS BETWEEN NETWORK DEVICES

Embodiments of the invention are directed to systems, methods, and computer program products for authentication of user activities based on establishing communication links between network devices. The invention is structured for dynamically authenticating transmitted activity processing data based on establishing seamless electronic communication handshake between network devices and without requiring user intervention. Specifically, the invention is structured to establish an operative communication link between the second networked device and the user device, wherein establishing the operative communication link comprises establishing a handshake between an entity intelligent platform associated with the second networked device and the multi-channel cognitive resource platform of the user device. Moreover, the invention is structured to authenticate the first activity for based on the identified code match.

MULTI-LAYER BIOMETRIC AUTHENTICATION
20220014526 · 2022-01-13 ·

Apparatus and methods for generating secure electronic document authentication are provided. Authentication may include formulating “electronic signatures” or any other validation of electronic information. Apparatus and methods may include capturing a target biometric feature to authenticate the electronic information. The target biometric feature may include a combination or sequence of biometric features. In some embodiments, the target biometric feature may be captured without specially prompting a user to submit a biometric feature. A captured target biometric feature may be augmented by generation of a one-time-password using a token stored locally on a mobile device. Authentication processes described herein provide more secure, accurate authentication for electronic information.

Extending management control to IoT devices

A technique uses a managed computing device to extend management control by an organization to IoT (Internet of Things) devices in a local environment of the computing device. The computing device discovers any local IoT devices and participates in a communication with a server to bring one or more of the IoT devices under management control. In some examples, extending management control involves enrolling selected IoT devices into a management framework of the organization and directing communications between the server and the respective IoT devices through the managed device, which provides a point-of-presence for administering management of the selected IoT devices in the local environment.

Systems and methods for data access control and account management

Embodiments of systems and methods for data access control and account management are described. In an embodiment, a server can apply flags to user accounts identified as requiring the user to perform an action or, in the case of potentially compromised access credentials, to offer the user the opportunity to authenticate and create new credentials. A user account database and an access report database can store access credentials, flags, and other relevant information for use by the server to perform various administrative, authentication, and protective actions on user accounts.

Single sign on with multiple authentication factors

The authentication of a client to multiple server resources with a single sign-on procedure using multiple factors is disclosed. One contemplated embodiment is a method in which a login session is initiated with the authentication system of a primary one of the multiple server resources. A first set of login credentials is transmitted thereto, and validated. A token is stored on the client indicating that the initial authentication was successful, which is then used to transition to a secondary one of the multiple resources. A second set of login credentials is also transmitted, and access to the secondary one of the multiple resources is granted on the basis of a validated token and second set of login credentials.

Detecting anomalies during operation of a computer system based on multimodal data

The system obtains a multimodal dataset containing different types of data gathered during operation of the computer system, wherein the multimodal dataset includes time-series data for different variables associated with operation of the computer system. Next, the system forms a set of feature groups from the multimodal dataset, wherein each feature group comprises variables from the multimodal dataset containing the same type of data. The system then computes a tripoint similarity matrix for each feature group, and aggregates the tripoint similarity matrices for the feature groups to produce a crossmodal tripoint similarity matrix. Next, the system uses the crossmodal tripoint similarity matrix to cluster the multimodal dataset to form a model. The system then performs prognostic-surveillance operations on real-time multimodal data received from the computer system, wherein the prognostic-surveillance operations use the model as a classifier to detect anomalies. When an anomaly is detected, the system triggers an alert.

Systems and methods to verify identity of an authenticated user using a digital health passport

The technology disclosed relates to authenticating users using a plurality of non-deterministic registration biometric inputs. During registration, a plurality of non-deterministic biometric inputs are given as input to a trained machine learning model to generate sets of feature vectors. The non-deterministic biometric inputs can include a plurality of face images and a plurality of voice samples of a user. A characteristic identity vector for the user can be determined by averaging feature vectors. During authentication, a plurality of non-deterministic biometric inputs are given as input to a trained machine learning model to generate a set of authentication feature vectors. The sets of feature vectors are projected onto a surface of a hyper-sphere. The system can authenticate the user when a cosine distance between the authentication feature vector and a characteristic identity vector for the user is less than a pre-determined threshold.

Device, system, and method of user authentication based on user-specific characteristics of task performance
11223619 · 2022-01-11 · ·

Devices, systems, and methods of detecting user identity, authenticating a user to a computerized service or to an electronic device, differentiating between users of a computerized service, and detecting possible attackers or possible fraudulent transactions. A method includes: generating a user authentication session that requires a user to enter a secret by performing a task; monitoring the user interactions during task performance; extracting a user-specific behavioral characteristic, and utilizing it as a factor in user authentication. The task requires the user to perform on-screen operations via a touch-screen or touchpad or mouse or other input unit of the electronic device, or to move in space or tilt in space the entirety of the electronic device in a way that causes inputting of the secret data-item.

Federated identity management for data repositories

A method and system for performing federated identity management are described. The method and system include receiving a communication for a data source at a wrapper. The wrapper includes a dispatcher and a service. The dispatcher receives the communication and is data agnostic. The communication corresponds to end user credentials for an end user. The method and system include providing the communication from the dispatcher to the data source and to the service. The method and system also use the service to authenticate the end user based on the end user credentials and utilizing federated identity management.

PROVIDING IMAGES WITH PRIVACY LABEL
20220004652 · 2022-01-06 ·

A method for providing images, comprising: performing authentication of an entity (1010);obtaining identity information of the entity based on the authentication (1020); obtaining one or more images associated with the entity based at least on the identity information of the entity (1030); and providing the one or more images, wherein each image in the one or more images is attached with a privacy label (1040).