Patent classifications
H04L2463/082
Behavioral baselining from a data source perspective for detection of compromised users
A method and system are disclosed. The method and system include receiving, at a wrapper, a communication and a context associated with the communication from a client. The communication is for a data source. The wrapper includes a dispatcher and a service. The dispatcher receives the communication and is data agnostic. The method and system also include providing the context from the dispatcher to the service. In some embodiments, the method and system use the service to compare the context to a behavioral baseline for the client. The behavioral baseline incorporates a plurality of contexts previously received from the client.
User scanning and one-way augmented reality viewing system
An augmented reality customer interaction system includes a transparent panel having a first side and a second side that is opposite to the first side, and a camera device configured to capture visual data from an area adjacent to the second side of the transparent panel. The visual data includes identifying features of a customer located in the area with respect to the second side of the transparent panel. The system further includes a projection system configured to project information on the first side of the transparent panel. The information projected on the first side of the transparent panel may include customer interaction data retrieved from a data store based on the identifying features of the customer.
Systems and methods for scalable-factor authentication
Authentication systems and methods can selectively authenticate a request to access a resource data store storing access rights associated with a user device. The systems and methods can scalably execute challenges workflows as part of the authentication process. For example, a request to access one or more access rights stored in the data store can be received from the user device. The user device can be authenticated using challenge workflows selected based on a device identifier of the user device. The selected challenge workflows can be executed to determine whether or not to grant access to the access rights stored in the resource data store.
Mobile device enabled desktop tethered and tetherless authentication
A technique is provided that integrates authentication from a mobile device (e.g., using biometrics, social informational data, questions and answers, and more) to allow login to laptops and desktops while they are disconnected from the Internet using a USB cable connection, Bluetooth or local wifi or any other similar protocol and/or connected to Internet without USB. The technique provides a cloud clearinghouse that ties a person's or entity's mobile device(s) to an identity that's used to authenticate a person (could be the same person) on a laptop, desktop, or similar computer system.
Asserting user, app, and device binding in an unmanaged mobile device
A request generated by an unmanaged app to access a resource is received from a mobile device. A notification is sent to the mobile device. A device level VPN connection to the mobile device is established. A unique identifier is associated with the device level VPN. App level traffic received via the device level VPN is tagged with the unique identifier. Access to the resource is allowed in response to the request based at least in part on a determination based on the tags that app level traffic from a trusted app and app level traffic from the unmanaged app are associated with the same mobile device.
Preventing unauthorized account access based on location and time
The subject matter of this specification can be implemented in, among other things, a method that includes storing, in a collaboration platform, a first geographic location and a first time of a first authentication request for an account at the collaboration platform responsive to successful authentication of the first authentication request. The method includes receiving a second authentication request for the account at the collaboration platform. The method includes identifying a second geographic location and a second time of the second authentication request. The method includes providing access to the account responsive to a determination that a difference in time between the first time and the second time is large enough that a user of the account is able to travel a difference in distance between the first geographic location and the second geographic location within the difference in time.
Method of processing a transaction sent from a proof entity
The present invention relates to a method of processing a transaction sent from a proof entity (1) connected to a verification entity (2); the proof entity (1) having at least one secret key and a candidate authentication data, the verification entity (2) having the hash value of a reference authentication data; the method comprising the steps of: (a) generation by data processing means (11) of the proof entity (1) of: a signature of the proof entity (1) from said secret key; a zero-knowledge proof of the fact that the candidate authentication data and the reference authentication data match; (b) transmission to the verification entity (2) of transaction data comprising at least: said signature of the proof entity (1); said zero-knowledge proof; (c) verification by the data processing means (21) of the verification entity (2) that said signature of the proof entity (1) and the zero-knowledge proof are valid; (d) processing said transaction.
A COMPUTER IMPLEMENTED METHOD
A computer-implemented method of authenticating an identity of a specific user is disclosed. The method comprises the steps of acquiring a first data set representative of a voice of a user over a time interval between a first and second time, and providing the first data set as input to a computing device. The method further comprises acquiring a second data set representative of a visual appearance of at least a portion of the user over the time interval between the first and second time, and providing the second data set as input to the computing device. The method further comprises maintaining a temporal synchronous of the first and second data sets over the time interval comparing the first and second data sets with predetermined data sets relating to the voice and visual appearance of at least a portion of the specific user, generating a confidence level in dependence of a relative correspondence of the first and second data sets with the predetermined data sets and authenticating the user as the specific user where the confidence level is above a predetermined value.
Dynamic learning system for intelligent authentication
Techniques for intelligently deciding the optimal authenticator(s) from amongst those supported by an electronic device are described. The authentication system according to some embodiments may include a dynamic machine learner that incorporates the attributes of: (i) user behavior attributes (e.g., preferred authenticator); (ii) device attributes (e.g., hardware and software specifications, applications, etc.); and (iii) operating environment attributes (e.g., ambient light, noise, etc.), as well as the interplay between the aforementioned attributes over time to make the decision. In some embodiments, the authentication activities and patterns of other users of similar type (e.g., users exhibiting similar behavior across different operating environments) can also be learned and employed to improve the decision making process over time.
Authentication system and authentication method
An authentication system is provided with: a first input unit and a second input unit into which authentication information can be input; a first computing unit which performs computation on the basis of the authentication information input into the first input unit and a communication counterpart-side authentication parameter registered in a communication counterpart; a second computing unit which performs computation on the basis of the authentication information input into the second input unit and a portable terminal-side authentication parameter registered in a portable terminal; and authentication units which, if the authentication information has been input into the first or the second input unit, perform authentication on the basis of the result of computation by corresponding computing unit and the portable terminal-side authentication parameter.