Patent classifications
H04L2463/082
SELF-OWNED AUTHENTICATION AND IDENTITY FRAMEWORK
A user, using a user-computing device connected to a computer network, is authenticated to access a computing resource managed by a system on the computer network. The user computing device presents a user interface to prompt the user to input a value for each of a set of user-defined credentials that the user has previously defined for a SAIF server to authenticate the user to access the computer resource, thereby forming a set of input values. Modified values, each generated from and representing a corresponding one of the input values, are transmitted and validated by comparing them with corresponding modified forms of user-defined credential values stored in a memory, thereby determining whether the user is authenticated to access the computing resource on the system.
Application for confirming multi-person authentication
A secure server is configured to host one or more secure applications. A first user device includes a camera operable to capture a first image of a first user of the first user device. The first user device receives a notification that indicates confirmation of authentication of a second user of a second user device is needed after the second user requests access to the secure server. Following receipt of the notification, the first user device captures a first image of the first user. The first image includes at least a portion of a face of the first user. Facial recognition is performed, and results of facial recognition are provided to the second user device where it is used for multi-person authentication.
Information security system and method for phishing threat detection using tokens
A system for identifying email messages associated with phishing threats accesses an email message sent to a receiving computing device, where the email message is associated with a sender's email address. The system determines whether the sender's email address is associated with a token from a plurality of tokens stored in a token-email address mapping table. The system determines that the email message is associated with a phishing threat, in response to determining that the sender's email address is not associated with a token from a plurality of tokens from among a token-email mapping table.
DYNAMIC POLICY BASED ON USER EXPERIENCE
Entity models are used to evaluate potential risk of entities, either individually or in groups, in order to evaluate suspiciousness within an enterprise network. These individual or aggregated risk assessments can be used to adjust the security policy for compute instances within the enterprise network. A security policy may specify security settings such as network speed, filtering levels, network isolation, levels of privilege, and the like.
MULTI-FACTOR AUTHENTICATION VIA MIXED REALITY
The disclosure relates to an authentication approach to grant access to a secure service on an electronic device. The authentication approach includes receiving, via an electronic device, a request to access the secure service. The authentication approach includes determining whether the electronic device is positioned at a location that corresponds to a virtual authentication lock. The authentication approach includes displaying, in response to determining the device is positioned at the location that corresponds to the virtual authentication lock, the virtual authentication lock on a display of the electronic device. The authentication approach includes receiving one or more interactions with the virtual authentication lock. The authentication approach includes determining whether the one or more interactions correspond to one or more authentication interactions related to the virtual authentication lock and granting, in response to the one or more interactions corresponding to the one or more authentication interactions, access to the secure service.
Enterprise document classification
A collection of documents or other files and the like within an enterprise network are labelled according to an enterprise document classification scheme, and then a recognition model such as a neural network or other machine learning model can be used to automatically label other files throughout the enterprise network. In this manner, documents and the like throughout an enterprise can be automatically identified and managed according to features such as confidentiality, sensitivity, security risk, business value, and so forth.
User scanning and one-way augmented reality viewing system
A method for providing augmented reality content includes identifying a customer at a customer interaction location, retrieving customer-specific interaction data, determining locations of a customer service representative in an area adjacent to a first side of a transparent panel and the customer in an area adjacent to a second side of the transparent panel, and projecting an augmented reality element to the first side of a transparent panel, the augmented reality element displaying the customer-specific interaction data on the first side of the transparent panel.
AUTHENTICATION APPARATUS, CONTROL METHOD, AND COMPUTER-READABLE MEDIUM
An authentication apparatus (2000) acquires a target image (30) including a face area (32) of a target entity (20). The authentication apparatus (2000) computes, for one or more registered entities, an authentication score indicating a level of a probability that the target entity (20) matches the registered entity by using face information (50) of the registered entity and the face area (32). The authentication apparatus (2000) detects a symbol (42) from the target image (30) when there is no registered entity whose authentication score is greater than a first threshold. The symbol (42) is displayed on an attachment (40) worn on the face. When determining whether there is a registered entity matching the symbol (42) among the registered entities satisfying a predetermined condition based on the authentication score, the authentication apparatus (2000) determines that there is a registered entity that matches the target entity (20).
Systems and methods for dynamically connecting one or more transportation vehicles to customers
Systems and methods are provided herein for connecting a transportation vehicle to a customer. This process may involve receiving a digital identifier of a user at a particular location, where the digital identifier may be obtained by one or more video capture devices. Such devices may be located in an environment of the one or more ridehail vehicles and the user and/or located on the one or more ridehail vehicles themselves. The process may also involve determining a ridehail vehicle to assign to the user based on the digital identifier indicating the user is at the particular location.
Automatic api document generation from scim metadata
Embodiments provide automatic representational state transfer application programming interface (“REST API”) document generation for System for Cross-domain Identity Management (“SCIM”) based resources. For each resource, embodiments identify all SCIM based resource type data files and corresponding schema, where each resource type data file includes resource type definition metadata. Embodiments identify available operations based on the resource type definition metadata and apply HyperText Markup Language (“HTML”) operations corresponding to the metadata based on an available Swagger Operation template engine. Embodiments convert SCIM based schema to Swagger schemas by iterating through each available schema and identifying attributes and preparing a Swagger attribute template engine to generate a Swagger based attribute definition to a Swagger template aggregator. Embodiments then generate Swagger JavaScript Object Notation (“JSON”) corresponding to the Swagger schemas.