Patent classifications
H04L2463/082
AUTOMATED AUTHENTICATION SYSTEMS AND METHODS INCLUDING AUTOMATED WASTE MANAGEMENT SYSTEM WITH AUTOMATED WEIGHT TICKET AND AUTHENTICATION
Disclosed and described herein are systems and methods that bring together edge technologies into a single, streamlined process that automates the tracking and usage of assets (containers, equipment, mobile storage, etc.). These systems and methods include the use of smart beacons, low power cellular, sensors (strain gauges, level, contact, ohm/voltage, etc.), voice, video, microcontroller advancements, and the like. Conventional systems that have electronic service order and/or tickets are still limited in their functionality because of data, communication and processing hurdles. Disclosed are modern electronic data capture systems (IoT sensors) along with algorithms to assist on the tracking of assets and workers, more quickly capture authorized transactions for billing and remove the manual processes.
SYSTEM AND METHOD FOR FACILITATING BANK ACCOUNT INFORMATION CHANGES
In a method for changing a user's bank account information in merchant account databases a server receives a login request including a user identification and first user authentication information. The server further receives a request to change bank account information from a first bank account to a second bank account for merchant accounts of the user and network login information for the first bank account. The server accesses an account information database for the first bank account and downloads transaction information for merchant transactions involving the first bank account. The server identifies a set of merchant user accounts involved in the merchant transactions and receives account login information for a data site associated with a selected account. The server accesses the data site and changes a bank account identification stored therein from the first bank account to the second bank account.
BRAIN-ACTUATED CONTROL AUTHENTICATED KEY EXCHANGE
A method includes extracting, by a computing system, movement intentions of an individual from neural signals; mapping, by a secure element of the computing system, the movement intentions to a character string; and generating, by the computing system, a symmetric encryption key using the character string as an input to a key exchange protocol.
SYSTEMS AND METHODS FOR SECURE REMOTE IDENTITY VERIFICATION
Systems and methods are provided for authenticating an identity of a user requesting a resource or service from an entity. In some embodiments, a system may include at least one processor; and a non-transitory medium containing instructions that cause the system to perform operations. The operations may include receiving credential information associated with the remote user, and receiving, from the server associated with the entity, first hash information. The operations may also include generating second hash information based on information associated with the user, comparing the first hash information with the second hash information, and transmitting an indication based on the comparison to the server associated with the entity.
DYNAMIC ENROLLMENT USING BIOMETRIC TOKENIZATION
Various embodiments relate to a dynamic biometric enrollment system. The dynamic biometric enrollment includes a processor and instructions stored in non-transitory machine-readable media. The instructions are configured to cause the server system to receive at least one biometric authentication sample from the user. The at least one tokenized biometric enrollment sample has been generated by tokenizing at least one biometric enrollment sample captured from a user associated with a unique user identifier. At least one biometric authentication sample captured from the user is retrieved. The at least one tokenized biometric enrollment sample is detokenized to retrieve the at least one biometric enrollment sample. The at least one biometric enrollment sample is processed using a biometric processing algorithm to generate a dynamic biometric reference template. It is determined whether the at least one biometric authentication sample matches with the dynamic biometric reference template.
METHOD AND SYSTEM FOR AUTHENTICATING A USER IN A SESSION INITIATED ON A COMPUTING DEVICE
A method for authenticating a user in a session initiated on a computing device is disclosed herein. In a specific embodiment, the method comprises identifying a selection of an authentication verifier (801, 1101, 1205, 1305, 1405, 1505) from a set of possible authentication verifiers for the session, the selected authentication verifier (801, 1101, 1205, 1305, 1405, 1505) being 10 communicated within the session to the session user; identifying an authentication device (17) associated with an identifier for the session; providing at least two of the set of possible authentication verifiers for selection at the authentication device (17) for the session, the at least two of the set of possible authentication verifiers including the selected authentication verifier (801, 1101, 15 1205, 1305, 1405, 1505); receiving an authentication device selection from the authentication device (17) by a user’s selection from the at least two of the set of possible authentication verifiers; and determining if the authentication device selection matches the selected authentication verifier (801, 1101, 1205, 1305, 1405, 1505) as communicated within the session. A system for authenticating 20 the user in the session is also disclosed.
Contactless card personal identification system
A dual-factor PIN based authentication system and method uses a cryptogram provided by a contactless card associated with the client in association with a PIN stored by the contactless card to authenticate the client. In some embodiments, cryptogram authentication may be preconditioned upon a PIN match determination by the contactless card. In other embodiments, the cryptogram may be formed at least in part using the personal identification number (PIN) stored on the contactless card encoded using a dynamic key stored by the contactless card and uniquely associated with the client. Authentication may be achieved by comparing the cryptogram formed using the PIN against an expected cryptogram generated an expected PIN and an expected dynamic key.
Authentication scheme in a virtual private network
A method including configuring a first server to determine an encrypted authentication packet, the configuring including, configuring the first server to determine a crypted code field to indicate a type associated with the encryption authentication packet and that at least a portion of the encryption authentication packet is encrypted, and configuring the first server to determine a crypted payload based at least in part on encrypting one or more fields of an initial authentication packet; and configuring the first server to transmit, to a second server, the encrypted authentication packet to enable the first server and the second server to conduct an authentication process. Various other aspects are contemplated.
SYSTEM AND METHOD FOR PROVIDING MULTI FACTOR AUTHORIZATION TO RDP SERVICES THROUGH A ZERO TRUST CLOUD ENVIRONMENT
Remote desktop protocol (RDP) is a proprietary protocol for controlling machines over a network. In order to overcome certain deficiencies of the protocol a method is disclosed utilized in a zero trust cloud environment, to provide access to a RDP servers utilizing multifactor authorization services which are not natively supported by RDP. This is performed utilizing an RDP client while simultaneously providing an authenticated and secure policy based experience through a zero trust network.
Autonomous multi-factor authentication
An apparatus comprises a processing device that is configured to maintain a list of a managed devices, to generate a seed value and to submit a login request to a first managed device. The processing device is configured to generate a value based at least in part on the seed value and to select a second managed device from the list based at least in part on the value. The processing device is further configured to receive a second factor authentication challenge from the first managed device and to obtain a device key encrypted passcode from the second managed device. The processing device is further configured to provide the device key encrypted passcode to the first managed device and to receive a successful authentication of the login request from the first managed device based at least in part on providing the device key encrypted passcode to the first managed device.