Patent classifications
H04L2463/082
SYSTEMS AND METHODS FOR FACILITATING COMMUNICATION BETWEEN A USER AND A SERVICE PROVIDER
Systems and methods are disclosed for generating a dynamic customized script to facilitate communication between a user and a service provider. The method includes receiving, via an interactive voice response (IVR) system, a request from a mobile device associated with at least one user. The contextual information associated with at least one user is processed, in real-time, based, at least in part, on the request. A dynamic customized script specific to the request is generated, in real-time, based, at least in part, on the processing of the contextual information. The request is routed, via the IVR system, to an agent from a pool of agents of the service provider. A presentation of the dynamic customized script is generated in a user interface of a device associated with the agent, wherein the dynamic customized script is step-by-step guidance to the agent for handling the request of at least one user.
Method and apparatus for verifying user using multiple biometric verifiers
A user verification apparatus may perform user verification using multiple biometric verifiers. The user verification apparatus may set a termination stage of one or more biometric verifiers. Multiple biometric verifiers may be used to generate outputs, for which separate termination stages are set to establish a particular combination of set termination stages associated with the multiple biometric verifiers, and the user verification apparatus may fuse outputs of the biometric verifiers based on the particular combination of set termination stages. The user verification apparatus may verify a user based on a result of the fusing, and an unlocking command signal may be generated based on the verifying. The unlocking command signal may be generated to selectively grant access, to the verified user, to one or more elements of a device. The device may be a vehicle.
Authentication scheme in a virtual private network
A method including configuring a first server to receive, from a second server, an encrypted authentication packet to enable the first server and the second server to conduct an authentication process, the encrypted authentication packet including a crypted code field indicating a type associated with the encrypted authentication packet and a crypted payload including one or more encrypted fields; and configuring the first server to transmit, to the second server, a response based at least in part on determining the type associated with the encrypted authentication packet and on decrypting the one or more encrypted fields. Various other aspects are contemplated.
BIOMETRIC MULTI-FACTOR AUTHENTICATION
A system and method for providing multi-factor authentication using biometric data collected from a wearable. A disclosed method includes: receiving an authentication request for a user to access a resource via a client device; fetching a stored heartrate-voice (HRV) profile of the user; obtaining current heart data of the user from a wearable; obtaining a current voice sample of the user from the wearable or the client device; comparing the current heart data and current voice sample with the HRV profile; and authenticating the user in response to a match between the current heart data and current voice sample with the HRV profile.
SYSTEM FOR MANAGING IOT DEVICES
Briefly, systems and methods for securely updating an IoT system are presented, the methods including: providing the IoT system, the IoT system including: IoT devices operable by a user; an IoT hub for electronically coupling the IoT devices to the user; a dashboard graphical user interfaces (GUIs) for enabling communication between the IoT vendors and the IoT user devices, where the dashboard GUIs includes a user dashboard for retrieving IoT user device information and for enabling secure data sharing with the IoT vendors; receiving a regulatory update requirement by the IoT vendor; determining a current status for each of the IoT user devices by the IoT vendor.
EMBEDDING CONTENT IN AUDIO CONTENT THROUGH A VOICE ASSISTANT
Disclosed are various approaches for authenticating a user through a voice assistant device and creating an association between the device and a user account. The request is associated with a network or federated service. The user can use a client device, such as a smartphone, to initiate an authentication flow. A passphrase is provided to the client device can captured by the client device and a voice assistant device. Audio captured by the client device and voice assistant device can be sent to an assistant connection service. The passphrase and an audio signature calculated from the audio can be validated. An association between the user account and the voice assistant device can then be created.
Method and system for authorizing acquisition of attack alarm information log of terminal
A method and a system for authorizing acquisition of an attack alarm information log of a terminal, belonging to the field of communication technology, the method includes: after obtaining the authentication account with an authority to obtain the attack alarm information log, a server authenticates the legality of a client tool; after the legality passes the authentication, the terminal sends a second to-be-authenticated data to the client tool, and the client tool sends the second to-be-authenticated data to the server; after the second to-be-authenticated data passes the authentication, the server encrypts the second to-be-authenticated data to generate a second authentication data, and sends the second authentication data to the terminal; if the second authentication data passes the authentication, the terminal obtains and encrypts the attack alarm information log, and then sends it to the client tool after encryption.
Multi-factor authentication in virtual, augmented, and mixed reality (xR) applications
Systems and methods for multi-factor authentication in virtual, augmented, and mixed reality (xR) applications are described. In some embodiments, an xR headset may include a processor and a memory coupled to the processor, the memory comprising program instructions stored thereon that, upon execution, cause the xR headset to: authenticate a user wearing the xR headset, and, in response to the authentication, log the user into an Information Handling System (IHS) distinct from the xR headset.
Data isolation and two-factor access control
Systems, methods and computer program products for controlling access to data owned by an application subscriber using two-factor access control and user partitioning are disclosed. In one embodiment, applications are executed on a multi-tenant application platform in which user partitions designate associated users and authentication services for those users. Tenants may subscribe to the applications and may allow access to the subscriptions through designated entry points. Users that are authenticated according to the corresponding user partition and access the application through the designated entry point are allowed to access the application through the tenant's subscription.
SYSTEM AND METHOD TO SECURELY EXECUTE DATACENTER MANAGEMENT OPERATIONS REMOTELY
Disclosed in various examples are methods, systems, and machine-readable media for exposing a Representational State Transfer (RESTful) interface to users whereby management commands on a datacenter may be issued remotely from the users' workstations for secure, remote management of the datacenter. An application task automation command (e.g., a POWERSHELL® command) is executed remotely by creating a proxy command (e.g., based on a POWERSHELL® cmdlet code) to cause the application task automation command to be executed when the proxy command is remotely invoked and deploying the proxy command to a remote computer, such as the user's workstation. The remote computer issues a request including a user identifier and any parameters for the application task automation command when the corresponding proxy command has been invoked by the remote computer. The datacenter determines whether the user is authorized to execute the application task automation command invoked by the proxy command, and upon authorization of the user, the datacenter computer runs the application task automation command with any parameters provided in the request to control configuration of, or data stored on, at least one computer in the datacenter.